Dec 13 14:28:20.839740 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:28:20.839758 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:28:20.839767 kernel: BIOS-provided physical RAM map: Dec 13 14:28:20.839773 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:28:20.839778 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:28:20.839783 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:28:20.839790 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:28:20.839795 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:28:20.839801 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:28:20.839808 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:28:20.839813 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 14:28:20.839819 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:28:20.839825 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:28:20.839832 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:28:20.839851 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:28:20.839861 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:28:20.839869 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:28:20.839876 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:28:20.839884 kernel: NX (Execute Disable) protection: active Dec 13 14:28:20.839891 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:28:20.839897 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:28:20.839904 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:28:20.839911 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:28:20.839919 kernel: extended physical RAM map: Dec 13 14:28:20.839927 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:28:20.839935 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:28:20.839941 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:28:20.839947 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:28:20.839953 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:28:20.839959 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:28:20.839965 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:28:20.839970 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 14:28:20.839976 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 14:28:20.839982 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 14:28:20.839988 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 14:28:20.839994 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 14:28:20.840001 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:28:20.840006 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:28:20.840012 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:28:20.840018 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:28:20.840027 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:28:20.840033 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:28:20.840039 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:28:20.840046 kernel: efi: EFI v2.70 by EDK II Dec 13 14:28:20.840053 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 14:28:20.840059 kernel: random: crng init done Dec 13 14:28:20.840066 kernel: SMBIOS 2.8 present. Dec 13 14:28:20.840072 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 14:28:20.840116 kernel: Hypervisor detected: KVM Dec 13 14:28:20.840123 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:28:20.840129 kernel: kvm-clock: cpu 0, msr e19a001, primary cpu clock Dec 13 14:28:20.840135 kernel: kvm-clock: using sched offset of 4183187473 cycles Dec 13 14:28:20.840144 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:28:20.840151 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:28:20.840157 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:28:20.840164 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:28:20.840170 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 14:28:20.840177 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:28:20.840183 kernel: Using GB pages for direct mapping Dec 13 14:28:20.840190 kernel: Secure boot disabled Dec 13 14:28:20.840196 kernel: ACPI: Early table checksum verification disabled Dec 13 14:28:20.840204 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 14:28:20.840210 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 14:28:20.840217 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:28:20.840224 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:28:20.840230 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 14:28:20.840236 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:28:20.840243 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:28:20.840249 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:28:20.840256 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:28:20.840264 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 14:28:20.840270 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 14:28:20.840277 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 14:28:20.840283 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 14:28:20.840289 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 14:28:20.840296 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 14:28:20.840302 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 14:28:20.840309 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 14:28:20.840315 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 14:28:20.840322 kernel: No NUMA configuration found Dec 13 14:28:20.840329 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 14:28:20.840335 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 14:28:20.840342 kernel: Zone ranges: Dec 13 14:28:20.840348 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:28:20.840355 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 14:28:20.840361 kernel: Normal empty Dec 13 14:28:20.840368 kernel: Movable zone start for each node Dec 13 14:28:20.840374 kernel: Early memory node ranges Dec 13 14:28:20.840382 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:28:20.840388 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 14:28:20.840395 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 14:28:20.840401 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 14:28:20.840407 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 14:28:20.840414 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 14:28:20.840420 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 14:28:20.840427 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:28:20.840433 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:28:20.840439 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 14:28:20.840447 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:28:20.840453 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 14:28:20.840460 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 14:28:20.840467 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 14:28:20.840473 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:28:20.840479 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:28:20.840486 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:28:20.840492 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:28:20.840499 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:28:20.840507 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:28:20.840513 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:28:20.840519 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:28:20.840526 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:28:20.840532 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:28:20.840539 kernel: TSC deadline timer available Dec 13 14:28:20.840545 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:28:20.840552 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:28:20.840558 kernel: kvm-guest: setup PV sched yield Dec 13 14:28:20.840566 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:28:20.840572 kernel: Booting paravirtualized kernel on KVM Dec 13 14:28:20.840584 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:28:20.840592 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:28:20.840599 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:28:20.840605 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:28:20.840612 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:28:20.840618 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:28:20.840625 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 14:28:20.840632 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:28:20.840639 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:28:20.840646 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 14:28:20.840654 kernel: Policy zone: DMA32 Dec 13 14:28:20.840662 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:28:20.840669 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:28:20.840676 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:28:20.840685 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:28:20.840691 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:28:20.840699 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 169308K reserved, 0K cma-reserved) Dec 13 14:28:20.840705 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:28:20.840712 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:28:20.840719 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:28:20.840726 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:28:20.840734 kernel: rcu: RCU event tracing is enabled. Dec 13 14:28:20.840741 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:28:20.840749 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:28:20.840755 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:28:20.840762 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:28:20.840769 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:28:20.840776 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:28:20.840783 kernel: Console: colour dummy device 80x25 Dec 13 14:28:20.840790 kernel: printk: console [ttyS0] enabled Dec 13 14:28:20.840796 kernel: ACPI: Core revision 20210730 Dec 13 14:28:20.840803 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:28:20.840811 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:28:20.840818 kernel: x2apic enabled Dec 13 14:28:20.840825 kernel: Switched APIC routing to physical x2apic. Dec 13 14:28:20.840832 kernel: kvm-guest: setup PV IPIs Dec 13 14:28:20.840846 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:28:20.840854 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:28:20.840861 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:28:20.840868 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:28:20.840874 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:28:20.840882 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:28:20.840889 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:28:20.840896 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:28:20.840903 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:28:20.840910 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:28:20.840917 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:28:20.840924 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:28:20.840930 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:28:20.840938 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:28:20.840946 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:28:20.840953 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:28:20.840960 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:28:20.840967 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:28:20.840974 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:28:20.840980 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:28:20.840987 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:28:20.840994 kernel: LSM: Security Framework initializing Dec 13 14:28:20.841001 kernel: SELinux: Initializing. Dec 13 14:28:20.841008 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:28:20.841015 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:28:20.841022 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:28:20.841029 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:28:20.841036 kernel: ... version: 0 Dec 13 14:28:20.841043 kernel: ... bit width: 48 Dec 13 14:28:20.841049 kernel: ... generic registers: 6 Dec 13 14:28:20.841057 kernel: ... value mask: 0000ffffffffffff Dec 13 14:28:20.841063 kernel: ... max period: 00007fffffffffff Dec 13 14:28:20.841072 kernel: ... fixed-purpose events: 0 Dec 13 14:28:20.841098 kernel: ... event mask: 000000000000003f Dec 13 14:28:20.841105 kernel: signal: max sigframe size: 1776 Dec 13 14:28:20.841111 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:28:20.841118 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:28:20.841125 kernel: x86: Booting SMP configuration: Dec 13 14:28:20.841131 kernel: .... node #0, CPUs: #1 Dec 13 14:28:20.841138 kernel: kvm-clock: cpu 1, msr e19a041, secondary cpu clock Dec 13 14:28:20.841145 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:28:20.841153 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 14:28:20.841160 kernel: #2 Dec 13 14:28:20.841167 kernel: kvm-clock: cpu 2, msr e19a081, secondary cpu clock Dec 13 14:28:20.841173 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:28:20.841180 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 14:28:20.841187 kernel: #3 Dec 13 14:28:20.841194 kernel: kvm-clock: cpu 3, msr e19a0c1, secondary cpu clock Dec 13 14:28:20.841200 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:28:20.841207 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 14:28:20.841214 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:28:20.841222 kernel: smpboot: Max logical packages: 1 Dec 13 14:28:20.841229 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:28:20.841236 kernel: devtmpfs: initialized Dec 13 14:28:20.841242 kernel: x86/mm: Memory block size: 128MB Dec 13 14:28:20.841249 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 14:28:20.841256 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 14:28:20.841263 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 14:28:20.841270 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 14:28:20.841277 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 14:28:20.841285 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:28:20.841292 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:28:20.841299 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:28:20.841305 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:28:20.841312 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:28:20.841319 kernel: audit: type=2000 audit(1734100100.292:1): state=initialized audit_enabled=0 res=1 Dec 13 14:28:20.841326 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:28:20.841333 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:28:20.841340 kernel: cpuidle: using governor menu Dec 13 14:28:20.841347 kernel: ACPI: bus type PCI registered Dec 13 14:28:20.841354 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:28:20.841361 kernel: dca service started, version 1.12.1 Dec 13 14:28:20.841368 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:28:20.841375 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:28:20.841382 kernel: PCI: Using configuration type 1 for base access Dec 13 14:28:20.841389 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:28:20.841396 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:28:20.841404 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:28:20.841411 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:28:20.841417 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:28:20.841424 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:28:20.841431 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:28:20.841438 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:28:20.841444 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:28:20.841451 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:28:20.841458 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:28:20.841466 kernel: ACPI: Interpreter enabled Dec 13 14:28:20.841473 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:28:20.841479 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:28:20.841486 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:28:20.841493 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:28:20.841500 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:28:20.841609 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:28:20.841682 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:28:20.841751 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:28:20.841760 kernel: PCI host bridge to bus 0000:00 Dec 13 14:28:20.841830 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:28:20.841902 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:28:20.841961 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:28:20.842021 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:28:20.842092 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:28:20.842156 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 14:28:20.842216 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:28:20.842296 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:28:20.842389 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:28:20.842484 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 14:28:20.842554 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 14:28:20.842625 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 14:28:20.842691 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 14:28:20.842756 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:28:20.842834 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:28:20.842917 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 14:28:20.842984 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 14:28:20.843050 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 14:28:20.843165 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:28:20.843238 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 14:28:20.843304 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 14:28:20.843370 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 14:28:20.843443 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:28:20.843529 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 14:28:20.843601 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 14:28:20.843671 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 14:28:20.843739 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 14:28:20.843824 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:28:20.843907 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:28:20.843982 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:28:20.845526 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 14:28:20.845615 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 14:28:20.845697 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:28:20.845764 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 14:28:20.845773 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:28:20.845781 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:28:20.845788 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:28:20.845795 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:28:20.845802 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:28:20.845808 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:28:20.845818 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:28:20.845824 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:28:20.845831 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:28:20.845850 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:28:20.845857 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:28:20.845864 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:28:20.845871 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:28:20.845878 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:28:20.845885 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:28:20.845893 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:28:20.845900 kernel: iommu: Default domain type: Translated Dec 13 14:28:20.845907 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:28:20.845975 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:28:20.846040 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:28:20.846126 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:28:20.846136 kernel: vgaarb: loaded Dec 13 14:28:20.846143 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:28:20.846150 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:28:20.846159 kernel: PTP clock support registered Dec 13 14:28:20.846166 kernel: Registered efivars operations Dec 13 14:28:20.846173 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:28:20.846180 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:28:20.846187 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 14:28:20.846194 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 14:28:20.846200 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 14:28:20.846207 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 14:28:20.846213 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 14:28:20.846222 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 14:28:20.846228 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:28:20.846235 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:28:20.846242 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:28:20.846249 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:28:20.846256 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:28:20.846263 kernel: pnp: PnP ACPI init Dec 13 14:28:20.846356 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:28:20.846370 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:28:20.846383 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:28:20.846390 kernel: NET: Registered PF_INET protocol family Dec 13 14:28:20.846397 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:28:20.846404 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:28:20.846411 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:28:20.846417 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:28:20.846424 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:28:20.846432 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:28:20.846439 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:28:20.846446 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:28:20.846453 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:28:20.846460 kernel: NET: Registered PF_XDP protocol family Dec 13 14:28:20.846532 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 14:28:20.846599 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 14:28:20.846660 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:28:20.846722 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:28:20.846780 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:28:20.846849 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:28:20.846910 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:28:20.846970 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 14:28:20.846979 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:28:20.846986 kernel: Initialise system trusted keyrings Dec 13 14:28:20.846993 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:28:20.847000 kernel: Key type asymmetric registered Dec 13 14:28:20.847009 kernel: Asymmetric key parser 'x509' registered Dec 13 14:28:20.847016 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:28:20.847031 kernel: io scheduler mq-deadline registered Dec 13 14:28:20.847039 kernel: io scheduler kyber registered Dec 13 14:28:20.847047 kernel: io scheduler bfq registered Dec 13 14:28:20.847054 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:28:20.847061 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:28:20.847069 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:28:20.847087 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:28:20.847096 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:28:20.847103 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:28:20.847110 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:28:20.847118 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:28:20.847125 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:28:20.847198 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:28:20.847209 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:28:20.847284 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:28:20.847348 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:28:20 UTC (1734100100) Dec 13 14:28:20.847416 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:28:20.847430 kernel: efifb: probing for efifb Dec 13 14:28:20.847440 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 14:28:20.847448 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 14:28:20.847455 kernel: efifb: scrolling: redraw Dec 13 14:28:20.847462 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:28:20.847469 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 14:28:20.847476 kernel: fb0: EFI VGA frame buffer device Dec 13 14:28:20.847486 kernel: pstore: Registered efi as persistent store backend Dec 13 14:28:20.847493 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:28:20.847500 kernel: Segment Routing with IPv6 Dec 13 14:28:20.847509 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:28:20.847516 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:28:20.847523 kernel: Key type dns_resolver registered Dec 13 14:28:20.847531 kernel: IPI shorthand broadcast: enabled Dec 13 14:28:20.847539 kernel: sched_clock: Marking stable (426374913, 130254906)->(605563808, -48933989) Dec 13 14:28:20.847546 kernel: registered taskstats version 1 Dec 13 14:28:20.847553 kernel: Loading compiled-in X.509 certificates Dec 13 14:28:20.847561 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:28:20.847568 kernel: Key type .fscrypt registered Dec 13 14:28:20.847575 kernel: Key type fscrypt-provisioning registered Dec 13 14:28:20.847583 kernel: pstore: Using crash dump compression: deflate Dec 13 14:28:20.847591 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:28:20.847599 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:28:20.847606 kernel: ima: No architecture policies found Dec 13 14:28:20.847613 kernel: clk: Disabling unused clocks Dec 13 14:28:20.847620 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:28:20.847627 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:28:20.847635 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:28:20.847642 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:28:20.847649 kernel: Run /init as init process Dec 13 14:28:20.847658 kernel: with arguments: Dec 13 14:28:20.847665 kernel: /init Dec 13 14:28:20.847672 kernel: with environment: Dec 13 14:28:20.847679 kernel: HOME=/ Dec 13 14:28:20.847686 kernel: TERM=linux Dec 13 14:28:20.847693 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:28:20.847702 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:28:20.847712 systemd[1]: Detected virtualization kvm. Dec 13 14:28:20.847721 systemd[1]: Detected architecture x86-64. Dec 13 14:28:20.847728 systemd[1]: Running in initrd. Dec 13 14:28:20.847736 systemd[1]: No hostname configured, using default hostname. Dec 13 14:28:20.847743 systemd[1]: Hostname set to . Dec 13 14:28:20.847751 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:28:20.847758 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:28:20.847766 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:28:20.847773 systemd[1]: Reached target cryptsetup.target. Dec 13 14:28:20.847781 systemd[1]: Reached target paths.target. Dec 13 14:28:20.847790 systemd[1]: Reached target slices.target. Dec 13 14:28:20.847797 systemd[1]: Reached target swap.target. Dec 13 14:28:20.847805 systemd[1]: Reached target timers.target. Dec 13 14:28:20.847813 systemd[1]: Listening on iscsid.socket. Dec 13 14:28:20.847821 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:28:20.847829 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:28:20.847836 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:28:20.847859 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:28:20.847867 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:28:20.847875 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:28:20.847882 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:28:20.847890 systemd[1]: Reached target sockets.target. Dec 13 14:28:20.847897 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:28:20.847905 systemd[1]: Finished network-cleanup.service. Dec 13 14:28:20.847912 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:28:20.847920 systemd[1]: Starting systemd-journald.service... Dec 13 14:28:20.847929 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:28:20.847936 systemd[1]: Starting systemd-resolved.service... Dec 13 14:28:20.847944 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:28:20.847951 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:28:20.847959 kernel: audit: type=1130 audit(1734100100.839:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.847967 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:28:20.847975 kernel: audit: type=1130 audit(1734100100.843:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.847982 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:28:20.847994 systemd-journald[197]: Journal started Dec 13 14:28:20.848031 systemd-journald[197]: Runtime Journal (/run/log/journal/9bfb05c0d4e94cd1bc788de04c3a2118) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:28:20.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.849103 systemd[1]: Started systemd-journald.service. Dec 13 14:28:20.850108 kernel: audit: type=1130 audit(1734100100.848:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.852824 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 14:28:20.857270 kernel: audit: type=1130 audit(1734100100.853:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.854247 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:28:20.858667 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:28:20.865408 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:28:20.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.870101 kernel: audit: type=1130 audit(1734100100.865:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.872322 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:28:20.878266 kernel: audit: type=1130 audit(1734100100.873:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.873821 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:28:20.875025 systemd-resolved[199]: Positive Trust Anchors: Dec 13 14:28:20.875031 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:28:20.875057 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:28:20.877930 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 14:28:20.887680 systemd[1]: Started systemd-resolved.service. Dec 13 14:28:20.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.890337 systemd[1]: Reached target nss-lookup.target. Dec 13 14:28:20.894627 kernel: audit: type=1130 audit(1734100100.890:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.894647 dracut-cmdline[214]: dracut-dracut-053 Dec 13 14:28:20.897455 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:28:20.904168 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:28:20.909390 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 14:28:20.910472 kernel: Bridge firewalling registered Dec 13 14:28:20.927097 kernel: SCSI subsystem initialized Dec 13 14:28:20.938456 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:28:20.938486 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:28:20.939882 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:28:20.942687 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 14:28:20.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.944139 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:28:20.951102 kernel: audit: type=1130 audit(1734100100.945:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.946129 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:28:20.953738 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:28:20.958121 kernel: audit: type=1130 audit(1734100100.954:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:20.966100 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:28:20.982108 kernel: iscsi: registered transport (tcp) Dec 13 14:28:21.003363 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:28:21.003427 kernel: QLogic iSCSI HBA Driver Dec 13 14:28:21.024520 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:28:21.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.026411 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:28:21.072112 kernel: raid6: avx2x4 gen() 30235 MB/s Dec 13 14:28:21.089108 kernel: raid6: avx2x4 xor() 8293 MB/s Dec 13 14:28:21.106105 kernel: raid6: avx2x2 gen() 31561 MB/s Dec 13 14:28:21.123119 kernel: raid6: avx2x2 xor() 18053 MB/s Dec 13 14:28:21.140102 kernel: raid6: avx2x1 gen() 26195 MB/s Dec 13 14:28:21.157101 kernel: raid6: avx2x1 xor() 15176 MB/s Dec 13 14:28:21.174100 kernel: raid6: sse2x4 gen() 14658 MB/s Dec 13 14:28:21.191104 kernel: raid6: sse2x4 xor() 7458 MB/s Dec 13 14:28:21.208101 kernel: raid6: sse2x2 gen() 16152 MB/s Dec 13 14:28:21.225102 kernel: raid6: sse2x2 xor() 9703 MB/s Dec 13 14:28:21.242102 kernel: raid6: sse2x1 gen() 11837 MB/s Dec 13 14:28:21.259500 kernel: raid6: sse2x1 xor() 7702 MB/s Dec 13 14:28:21.259521 kernel: raid6: using algorithm avx2x2 gen() 31561 MB/s Dec 13 14:28:21.259533 kernel: raid6: .... xor() 18053 MB/s, rmw enabled Dec 13 14:28:21.260249 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:28:21.273109 kernel: xor: automatically using best checksumming function avx Dec 13 14:28:21.362113 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:28:21.368030 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:28:21.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.369000 audit: BPF prog-id=7 op=LOAD Dec 13 14:28:21.369000 audit: BPF prog-id=8 op=LOAD Dec 13 14:28:21.369899 systemd[1]: Starting systemd-udevd.service... Dec 13 14:28:21.381472 systemd-udevd[400]: Using default interface naming scheme 'v252'. Dec 13 14:28:21.386330 systemd[1]: Started systemd-udevd.service. Dec 13 14:28:21.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.387145 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:28:21.397223 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Dec 13 14:28:21.419843 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:28:21.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.421533 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:28:21.453958 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:28:21.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.484577 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:28:21.517002 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:28:21.517018 kernel: libata version 3.00 loaded. Dec 13 14:28:21.517032 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:28:21.517041 kernel: AES CTR mode by8 optimization enabled Dec 13 14:28:21.517049 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:28:21.517058 kernel: GPT:9289727 != 19775487 Dec 13 14:28:21.517067 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:28:21.517075 kernel: GPT:9289727 != 19775487 Dec 13 14:28:21.517107 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:28:21.517116 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:28:21.521832 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:28:21.547249 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:28:21.547267 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:28:21.547370 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:28:21.547453 kernel: scsi host0: ahci Dec 13 14:28:21.547549 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (455) Dec 13 14:28:21.547559 kernel: scsi host1: ahci Dec 13 14:28:21.547648 kernel: scsi host2: ahci Dec 13 14:28:21.547739 kernel: scsi host3: ahci Dec 13 14:28:21.547828 kernel: scsi host4: ahci Dec 13 14:28:21.547916 kernel: scsi host5: ahci Dec 13 14:28:21.547998 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 14:28:21.548007 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 14:28:21.548016 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 14:28:21.548025 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 14:28:21.548035 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 14:28:21.548044 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 14:28:21.533384 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:28:21.541927 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:28:21.546063 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:28:21.552579 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:28:21.556618 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:28:21.558219 systemd[1]: Starting disk-uuid.service... Dec 13 14:28:21.564217 disk-uuid[531]: Primary Header is updated. Dec 13 14:28:21.564217 disk-uuid[531]: Secondary Entries is updated. Dec 13 14:28:21.564217 disk-uuid[531]: Secondary Header is updated. Dec 13 14:28:21.567860 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:28:21.570101 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:28:21.573094 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:28:21.856115 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:28:21.856189 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:28:21.857114 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:28:21.858102 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:28:21.859098 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:28:21.860115 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:28:21.861111 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:28:21.861121 kernel: ata3.00: applying bridge limits Dec 13 14:28:21.862396 kernel: ata3.00: configured for UDMA/100 Dec 13 14:28:21.863111 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:28:21.895232 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:28:21.912770 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:28:21.912788 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:28:22.573095 disk-uuid[532]: The operation has completed successfully. Dec 13 14:28:22.574554 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:28:22.596386 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:28:22.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.596467 systemd[1]: Finished disk-uuid.service. Dec 13 14:28:22.600367 systemd[1]: Starting verity-setup.service... Dec 13 14:28:22.613105 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:28:22.630963 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:28:22.633911 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:28:22.636260 systemd[1]: Finished verity-setup.service. Dec 13 14:28:22.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.693097 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:28:22.693111 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:28:22.694608 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:28:22.696633 systemd[1]: Starting ignition-setup.service... Dec 13 14:28:22.698579 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:28:22.704786 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:28:22.704828 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:28:22.704840 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:28:22.713904 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:28:22.723474 systemd[1]: Finished ignition-setup.service. Dec 13 14:28:22.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.724693 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:28:22.761507 ignition[650]: Ignition 2.14.0 Dec 13 14:28:22.761518 ignition[650]: Stage: fetch-offline Dec 13 14:28:22.761571 ignition[650]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:28:22.761584 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:28:22.761698 ignition[650]: parsed url from cmdline: "" Dec 13 14:28:22.761702 ignition[650]: no config URL provided Dec 13 14:28:22.761707 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:28:22.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.768000 audit: BPF prog-id=9 op=LOAD Dec 13 14:28:22.766305 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:28:22.761714 ignition[650]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:28:22.768774 systemd[1]: Starting systemd-networkd.service... Dec 13 14:28:22.761731 ignition[650]: op(1): [started] loading QEMU firmware config module Dec 13 14:28:22.761736 ignition[650]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:28:22.770009 ignition[650]: op(1): [finished] loading QEMU firmware config module Dec 13 14:28:22.773210 ignition[650]: parsing config with SHA512: 7cbc3fc2993caebcd631762eadd5e0715e27afc0ef7810e58ca4024be17329ae23fdbe30d3575f6efebacb3d2b974a6256834b04dcb89c2f499bf44936bfc918 Dec 13 14:28:22.777347 unknown[650]: fetched base config from "system" Dec 13 14:28:22.778264 unknown[650]: fetched user config from "qemu" Dec 13 14:28:22.778576 ignition[650]: fetch-offline: fetch-offline passed Dec 13 14:28:22.778630 ignition[650]: Ignition finished successfully Dec 13 14:28:22.781034 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:28:22.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.796148 systemd-networkd[727]: lo: Link UP Dec 13 14:28:22.796156 systemd-networkd[727]: lo: Gained carrier Dec 13 14:28:22.797946 systemd-networkd[727]: Enumeration completed Dec 13 14:28:22.798014 systemd[1]: Started systemd-networkd.service. Dec 13 14:28:22.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.798655 systemd[1]: Reached target network.target. Dec 13 14:28:22.800906 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:28:22.801592 systemd[1]: Starting ignition-kargs.service... Dec 13 14:28:22.802615 systemd[1]: Starting iscsiuio.service... Dec 13 14:28:22.802663 systemd-networkd[727]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:28:22.803817 systemd-networkd[727]: eth0: Link UP Dec 13 14:28:22.803821 systemd-networkd[727]: eth0: Gained carrier Dec 13 14:28:22.811041 systemd[1]: Started iscsiuio.service. Dec 13 14:28:22.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.811891 systemd[1]: Starting iscsid.service... Dec 13 14:28:22.815580 iscsid[733]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:28:22.815580 iscsid[733]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:28:22.815580 iscsid[733]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:28:22.815580 iscsid[733]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:28:22.815580 iscsid[733]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:28:22.815580 iscsid[733]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:28:22.815580 iscsid[733]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:28:22.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.815825 systemd[1]: Started iscsid.service. Dec 13 14:28:22.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.833061 ignition[729]: Ignition 2.14.0 Dec 13 14:28:22.817187 systemd-networkd[727]: eth0: DHCPv4 address 10.0.0.122/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:28:22.833068 ignition[729]: Stage: kargs Dec 13 14:28:22.819041 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:28:22.833203 ignition[729]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:28:22.830896 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:28:22.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.833214 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:28:22.832974 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:28:22.834139 ignition[729]: kargs: kargs passed Dec 13 14:28:22.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.833242 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:28:22.834181 ignition[729]: Ignition finished successfully Dec 13 14:28:22.833455 systemd[1]: Reached target remote-fs.target. Dec 13 14:28:22.846967 ignition[749]: Ignition 2.14.0 Dec 13 14:28:22.834313 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:28:22.846976 ignition[749]: Stage: disks Dec 13 14:28:22.836429 systemd[1]: Finished ignition-kargs.service. Dec 13 14:28:22.847103 ignition[749]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:28:22.838297 systemd[1]: Starting ignition-disks.service... Dec 13 14:28:22.847115 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:28:22.845621 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:28:22.865642 systemd-fsck[761]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:28:22.848067 ignition[749]: disks: disks passed Dec 13 14:28:22.848982 systemd[1]: Finished ignition-disks.service. Dec 13 14:28:22.848135 ignition[749]: Ignition finished successfully Dec 13 14:28:22.849513 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:28:22.849597 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:28:22.849757 systemd[1]: Reached target local-fs.target. Dec 13 14:28:22.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.849944 systemd[1]: Reached target sysinit.target. Dec 13 14:28:22.850286 systemd[1]: Reached target basic.target. Dec 13 14:28:22.851133 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:28:22.870449 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:28:22.873646 systemd[1]: Mounting sysroot.mount... Dec 13 14:28:22.883097 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:28:22.883487 systemd[1]: Mounted sysroot.mount. Dec 13 14:28:22.884364 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:28:22.886911 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:28:22.887933 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:28:22.887962 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:28:22.887979 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:28:22.889852 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:28:22.891849 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:28:22.896412 initrd-setup-root[771]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:28:22.899165 initrd-setup-root[779]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:28:22.902589 initrd-setup-root[787]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:28:22.905240 initrd-setup-root[795]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:28:22.929356 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:28:22.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.930738 systemd[1]: Starting ignition-mount.service... Dec 13 14:28:22.932226 systemd[1]: Starting sysroot-boot.service... Dec 13 14:28:22.937952 bash[812]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:28:22.945313 ignition[814]: INFO : Ignition 2.14.0 Dec 13 14:28:22.946355 ignition[814]: INFO : Stage: mount Dec 13 14:28:22.946355 ignition[814]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:28:22.946355 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:28:22.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:22.947314 systemd[1]: Finished ignition-mount.service. Dec 13 14:28:22.951888 ignition[814]: INFO : mount: mount passed Dec 13 14:28:22.951888 ignition[814]: INFO : Ignition finished successfully Dec 13 14:28:22.949662 systemd[1]: Finished sysroot-boot.service. Dec 13 14:28:23.643105 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:28:23.653134 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (822) Dec 13 14:28:23.653179 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:28:23.653194 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:28:23.654966 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:28:23.658184 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:28:23.659834 systemd[1]: Starting ignition-files.service... Dec 13 14:28:23.674363 ignition[842]: INFO : Ignition 2.14.0 Dec 13 14:28:23.674363 ignition[842]: INFO : Stage: files Dec 13 14:28:23.676060 ignition[842]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:28:23.676060 ignition[842]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:28:23.676060 ignition[842]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:28:23.679976 ignition[842]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:28:23.679976 ignition[842]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:28:23.683799 ignition[842]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:28:23.685258 ignition[842]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:28:23.687072 unknown[842]: wrote ssh authorized keys file for user: core Dec 13 14:28:23.688230 ignition[842]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:28:23.689714 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:28:23.933309 systemd-networkd[727]: eth0: Gained IPv6LL Dec 13 14:28:24.060926 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 14:28:24.383503 ignition[842]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:28:24.383503 ignition[842]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Dec 13 14:28:24.387675 ignition[842]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:28:24.387675 ignition[842]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:28:24.387675 ignition[842]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Dec 13 14:28:24.387675 ignition[842]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:28:24.387675 ignition[842]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:28:24.408864 ignition[842]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:28:24.412257 ignition[842]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:28:24.412257 ignition[842]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:28:24.412257 ignition[842]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:28:24.412257 ignition[842]: INFO : files: files passed Dec 13 14:28:24.412257 ignition[842]: INFO : Ignition finished successfully Dec 13 14:28:24.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.410446 systemd[1]: Finished ignition-files.service. Dec 13 14:28:24.412956 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:28:24.414621 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:28:24.428575 initrd-setup-root-after-ignition[866]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:28:24.415328 systemd[1]: Starting ignition-quench.service... Dec 13 14:28:24.431050 initrd-setup-root-after-ignition[868]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:28:24.419630 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:28:24.421299 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:28:24.421361 systemd[1]: Finished ignition-quench.service. Dec 13 14:28:24.423141 systemd[1]: Reached target ignition-complete.target. Dec 13 14:28:24.424517 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:28:24.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.436491 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:28:24.436563 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:28:24.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.437919 systemd[1]: Reached target initrd-fs.target. Dec 13 14:28:24.439618 systemd[1]: Reached target initrd.target. Dec 13 14:28:24.440565 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:28:24.441205 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:28:24.461843 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:28:24.464223 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:28:24.472955 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:28:24.473934 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:28:24.475610 systemd[1]: Stopped target timers.target. Dec 13 14:28:24.477383 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:28:24.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.477480 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:28:24.479331 systemd[1]: Stopped target initrd.target. Dec 13 14:28:24.481426 systemd[1]: Stopped target basic.target. Dec 13 14:28:24.483356 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:28:24.485258 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:28:24.487115 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:28:24.489128 systemd[1]: Stopped target remote-fs.target. Dec 13 14:28:24.491043 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:28:24.493120 systemd[1]: Stopped target sysinit.target. Dec 13 14:28:24.494804 systemd[1]: Stopped target local-fs.target. Dec 13 14:28:24.496668 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:28:24.498597 systemd[1]: Stopped target swap.target. Dec 13 14:28:24.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.500427 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:28:24.500542 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:28:24.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.502528 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:28:24.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.504183 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:28:24.504269 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:28:24.506435 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:28:24.506527 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:28:24.519049 systemd[1]: Stopped target paths.target. Dec 13 14:28:24.520476 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:28:24.522195 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:28:24.524359 systemd[1]: Stopped target slices.target. Dec 13 14:28:24.525820 systemd[1]: Stopped target sockets.target. Dec 13 14:28:24.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.527281 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:28:24.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.527356 systemd[1]: Closed iscsid.socket. Dec 13 14:28:24.529091 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:28:24.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.529167 systemd[1]: Closed iscsiuio.socket. Dec 13 14:28:24.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.562223 ignition[882]: INFO : Ignition 2.14.0 Dec 13 14:28:24.562223 ignition[882]: INFO : Stage: umount Dec 13 14:28:24.562223 ignition[882]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:28:24.562223 ignition[882]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:28:24.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.530616 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:28:24.567917 ignition[882]: INFO : umount: umount passed Dec 13 14:28:24.567917 ignition[882]: INFO : Ignition finished successfully Dec 13 14:28:24.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.530718 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:28:24.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.553636 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:28:24.553745 systemd[1]: Stopped ignition-files.service. Dec 13 14:28:24.555789 systemd[1]: Stopping ignition-mount.service... Dec 13 14:28:24.556517 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:28:24.556610 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:28:24.558732 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:28:24.559632 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:28:24.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.559763 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:28:24.560665 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:28:24.560747 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:28:24.563440 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:28:24.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.563507 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:28:24.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.563934 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:28:24.563995 systemd[1]: Stopped ignition-mount.service. Dec 13 14:28:24.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.566477 systemd[1]: Stopped target network.target. Dec 13 14:28:24.567685 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:28:24.567720 systemd[1]: Stopped ignition-disks.service. Dec 13 14:28:24.568055 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:28:24.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.568092 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:28:24.571271 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:28:24.601000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:28:24.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.571301 systemd[1]: Stopped ignition-setup.service. Dec 13 14:28:24.571941 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:28:24.572330 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:28:24.579125 systemd-networkd[727]: eth0: DHCPv6 lease lost Dec 13 14:28:24.605000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:28:24.580194 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:28:24.580309 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:28:24.582896 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:28:24.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.582922 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:28:24.584991 systemd[1]: Stopping network-cleanup.service... Dec 13 14:28:24.585856 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:28:24.585895 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:28:24.587423 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:28:24.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.587455 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:28:24.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.590134 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:28:24.590186 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:28:24.592301 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:28:24.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.594200 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:28:24.594598 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:28:24.594685 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:28:24.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.600568 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:28:24.600636 systemd[1]: Stopped network-cleanup.service. Dec 13 14:28:24.606326 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:28:24.606462 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:28:24.610538 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:28:24.610935 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:28:24.610980 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:28:24.612908 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:28:24.612953 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:28:24.615199 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:28:24.615244 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:28:24.617504 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:28:24.617594 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:28:24.619548 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:28:24.619671 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:28:24.622312 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:28:24.623297 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:28:24.623352 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:28:24.627644 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:28:24.627743 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:28:24.782333 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:28:24.782439 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:28:24.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.783456 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:28:24.785350 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:28:24.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:24.785402 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:28:24.788423 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:28:24.804113 systemd[1]: Switching root. Dec 13 14:28:24.825702 iscsid[733]: iscsid shutting down. Dec 13 14:28:24.826630 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 14:28:24.826678 systemd-journald[197]: Journal stopped Dec 13 14:28:28.236074 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:28:28.236134 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:28:28.236145 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:28:28.236154 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:28:28.236164 kernel: SELinux: policy capability open_perms=1 Dec 13 14:28:28.236173 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:28:28.236182 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:28:28.236191 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:28:28.236201 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:28:28.236211 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:28:28.236222 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:28:28.236232 systemd[1]: Successfully loaded SELinux policy in 39.646ms. Dec 13 14:28:28.236252 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.721ms. Dec 13 14:28:28.236266 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:28:28.236279 systemd[1]: Detected virtualization kvm. Dec 13 14:28:28.236289 systemd[1]: Detected architecture x86-64. Dec 13 14:28:28.236299 systemd[1]: Detected first boot. Dec 13 14:28:28.236310 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:28:28.236322 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:28:28.236331 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:28:28.236342 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:28:28.236354 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:28:28.236366 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:28:28.236376 kernel: kauditd_printk_skb: 80 callbacks suppressed Dec 13 14:28:28.236385 kernel: audit: type=1334 audit(1734100108.051:84): prog-id=12 op=LOAD Dec 13 14:28:28.236396 kernel: audit: type=1334 audit(1734100108.052:85): prog-id=3 op=UNLOAD Dec 13 14:28:28.236406 kernel: audit: type=1334 audit(1734100108.054:86): prog-id=13 op=LOAD Dec 13 14:28:28.236418 kernel: audit: type=1334 audit(1734100108.056:87): prog-id=14 op=LOAD Dec 13 14:28:28.236427 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:28:28.236437 kernel: audit: type=1334 audit(1734100108.056:88): prog-id=4 op=UNLOAD Dec 13 14:28:28.236447 systemd[1]: Stopped iscsiuio.service. Dec 13 14:28:28.236458 kernel: audit: type=1334 audit(1734100108.056:89): prog-id=5 op=UNLOAD Dec 13 14:28:28.236468 kernel: audit: type=1131 audit(1734100108.058:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.236478 kernel: audit: type=1131 audit(1734100108.067:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.236489 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:28:28.236500 systemd[1]: Stopped iscsid.service. Dec 13 14:28:28.236510 kernel: audit: type=1131 audit(1734100108.074:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.236520 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:28:28.236530 kernel: audit: type=1334 audit(1734100108.079:93): prog-id=12 op=UNLOAD Dec 13 14:28:28.236539 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:28:28.236550 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:28:28.236562 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:28:28.236572 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:28:28.236583 systemd[1]: Created slice system-getty.slice. Dec 13 14:28:28.236593 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:28:28.236603 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:28:28.236614 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:28:28.236625 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:28:28.236636 systemd[1]: Created slice user.slice. Dec 13 14:28:28.236647 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:28:28.236657 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:28:28.236668 systemd[1]: Set up automount boot.automount. Dec 13 14:28:28.236687 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:28:28.236697 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:28:28.236708 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:28:28.236719 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:28:28.236731 systemd[1]: Reached target integritysetup.target. Dec 13 14:28:28.236741 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:28:28.236752 systemd[1]: Reached target remote-fs.target. Dec 13 14:28:28.236763 systemd[1]: Reached target slices.target. Dec 13 14:28:28.236773 systemd[1]: Reached target swap.target. Dec 13 14:28:28.236786 systemd[1]: Reached target torcx.target. Dec 13 14:28:28.236796 systemd[1]: Reached target veritysetup.target. Dec 13 14:28:28.236806 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:28:28.236818 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:28:28.236828 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:28:28.236839 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:28:28.236849 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:28:28.236859 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:28:28.236869 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:28:28.236880 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:28:28.236890 systemd[1]: Mounting media.mount... Dec 13 14:28:28.236902 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:28:28.236914 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:28:28.236925 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:28:28.236935 systemd[1]: Mounting tmp.mount... Dec 13 14:28:28.236945 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:28:28.236956 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:28:28.236966 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:28:28.236977 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:28:28.236987 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:28:28.236997 systemd[1]: Starting modprobe@drm.service... Dec 13 14:28:28.237009 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:28:28.237019 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:28:28.237029 systemd[1]: Starting modprobe@loop.service... Dec 13 14:28:28.237040 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:28:28.237050 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:28:28.237060 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:28:28.237071 kernel: loop: module loaded Dec 13 14:28:28.237091 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:28:28.237102 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:28:28.237113 kernel: fuse: init (API version 7.34) Dec 13 14:28:28.237126 systemd[1]: Stopped systemd-journald.service. Dec 13 14:28:28.237137 systemd[1]: Starting systemd-journald.service... Dec 13 14:28:28.237147 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:28:28.237158 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:28:28.237168 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:28:28.237178 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:28:28.237189 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:28:28.237199 systemd[1]: Stopped verity-setup.service. Dec 13 14:28:28.237211 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:28:28.237221 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:28:28.237232 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:28:28.237242 systemd[1]: Mounted media.mount. Dec 13 14:28:28.237255 systemd-journald[997]: Journal started Dec 13 14:28:28.237290 systemd-journald[997]: Runtime Journal (/run/log/journal/9bfb05c0d4e94cd1bc788de04c3a2118) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:28:24.887000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:28:25.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:28:25.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:28:25.087000 audit: BPF prog-id=10 op=LOAD Dec 13 14:28:25.087000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:28:25.087000 audit: BPF prog-id=11 op=LOAD Dec 13 14:28:25.087000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:28:25.120000 audit[916]: AVC avc: denied { associate } for pid=916 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:28:25.120000 audit[916]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=899 pid=916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.120000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:28:25.121000 audit[916]: AVC avc: denied { associate } for pid=916 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:28:25.121000 audit[916]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b9 a2=1ed a3=0 items=2 ppid=899 pid=916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:25.121000 audit: CWD cwd="/" Dec 13 14:28:25.121000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:25.121000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:25.121000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:28:28.051000 audit: BPF prog-id=12 op=LOAD Dec 13 14:28:28.052000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:28:28.054000 audit: BPF prog-id=13 op=LOAD Dec 13 14:28:28.056000 audit: BPF prog-id=14 op=LOAD Dec 13 14:28:28.056000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:28:28.056000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:28:28.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.079000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:28:28.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.210000 audit: BPF prog-id=15 op=LOAD Dec 13 14:28:28.210000 audit: BPF prog-id=16 op=LOAD Dec 13 14:28:28.210000 audit: BPF prog-id=17 op=LOAD Dec 13 14:28:28.211000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:28:28.211000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:28:28.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.234000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:28:28.234000 audit[997]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd2cc02a20 a2=4000 a3=7ffd2cc02abc items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:28.234000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:28:28.049813 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:28:25.118853 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:28:28.049825 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:28:25.119116 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:28:28.058346 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:28:25.119136 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:28:25.119169 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:28:25.119180 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:28:25.119206 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:28:25.119217 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:28:25.119394 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:28:25.119426 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:28:28.239231 systemd[1]: Started systemd-journald.service. Dec 13 14:28:25.119437 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:28:25.119759 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:28:28.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:25.119794 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:28:25.119810 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:28:25.119823 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:28:25.119837 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:28:25.119849 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:28:28.239702 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:28:27.757533 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:28:27.757791 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:28:27.757902 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:28:27.758093 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:28:27.758140 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:28:27.758205 /usr/lib/systemd/system-generators/torcx-generator[916]: time="2024-12-13T14:28:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:28:28.240701 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:28:28.241617 systemd[1]: Mounted tmp.mount. Dec 13 14:28:28.242647 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:28:28.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.243867 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:28:28.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.244988 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:28:28.245258 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:28:28.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.246401 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:28:28.246606 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:28:28.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.247733 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:28:28.247891 systemd[1]: Finished modprobe@drm.service. Dec 13 14:28:28.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.249070 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:28:28.249297 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:28:28.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.250430 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:28:28.250603 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:28:28.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.251765 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:28:28.251971 systemd[1]: Finished modprobe@loop.service. Dec 13 14:28:28.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.253298 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:28:28.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.254459 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:28:28.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.255714 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:28:28.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.257021 systemd[1]: Reached target network-pre.target. Dec 13 14:28:28.259029 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:28:28.261041 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:28:28.261938 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:28:28.263635 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:28:28.265536 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:28:28.266517 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:28:28.267492 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:28:28.268443 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:28:28.269407 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:28:28.270782 systemd-journald[997]: Time spent on flushing to /var/log/journal/9bfb05c0d4e94cd1bc788de04c3a2118 is 24.466ms for 1140 entries. Dec 13 14:28:28.270782 systemd-journald[997]: System Journal (/var/log/journal/9bfb05c0d4e94cd1bc788de04c3a2118) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:28:28.312383 systemd-journald[997]: Received client request to flush runtime journal. Dec 13 14:28:28.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.272211 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:28:28.276190 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:28:28.277332 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:28:28.281802 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:28:28.283122 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:28:28.284087 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:28:28.286294 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:28:28.293422 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:28:28.310013 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:28:28.313172 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:28:28.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.314685 udevadm[1020]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:28:28.915621 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:28:28.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.917000 audit: BPF prog-id=18 op=LOAD Dec 13 14:28:28.917000 audit: BPF prog-id=19 op=LOAD Dec 13 14:28:28.917000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:28:28.917000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:28:28.917987 systemd[1]: Starting systemd-udevd.service... Dec 13 14:28:28.934402 systemd-udevd[1022]: Using default interface naming scheme 'v252'. Dec 13 14:28:28.947012 systemd[1]: Started systemd-udevd.service. Dec 13 14:28:28.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.948000 audit: BPF prog-id=20 op=LOAD Dec 13 14:28:28.950320 systemd[1]: Starting systemd-networkd.service... Dec 13 14:28:28.955926 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:28:28.954000 audit: BPF prog-id=21 op=LOAD Dec 13 14:28:28.955000 audit: BPF prog-id=22 op=LOAD Dec 13 14:28:28.955000 audit: BPF prog-id=23 op=LOAD Dec 13 14:28:28.979850 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:28:28.982148 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:28:28.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:28.989393 systemd[1]: Started systemd-userdbd.service. Dec 13 14:28:29.033111 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:28:29.033146 systemd-networkd[1029]: lo: Link UP Dec 13 14:28:29.033150 systemd-networkd[1029]: lo: Gained carrier Dec 13 14:28:29.033529 systemd-networkd[1029]: Enumeration completed Dec 13 14:28:29.033632 systemd[1]: Started systemd-networkd.service. Dec 13 14:28:29.033640 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:28:29.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.035115 systemd-networkd[1029]: eth0: Link UP Dec 13 14:28:29.035123 systemd-networkd[1029]: eth0: Gained carrier Dec 13 14:28:29.038111 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:28:29.030000 audit[1028]: AVC avc: denied { confidentiality } for pid=1028 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:28:29.047226 systemd-networkd[1029]: eth0: DHCPv4 address 10.0.0.122/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:28:29.030000 audit[1028]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563a7add0c00 a1=337fc a2=7f02575e2bc5 a3=5 items=110 ppid=1022 pid=1028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:29.030000 audit: CWD cwd="/" Dec 13 14:28:29.030000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=1 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=2 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=3 name=(null) inode=15530 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=4 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=5 name=(null) inode=15531 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=6 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=7 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=8 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=9 name=(null) inode=15533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=10 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=11 name=(null) inode=15534 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=12 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=13 name=(null) inode=15535 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=14 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=15 name=(null) inode=15536 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=16 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=17 name=(null) inode=15537 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=18 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=19 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=20 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=21 name=(null) inode=15539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=22 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=23 name=(null) inode=15540 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=24 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=25 name=(null) inode=15541 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=26 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=27 name=(null) inode=15542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=28 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=29 name=(null) inode=15543 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=30 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=31 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=32 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=33 name=(null) inode=15545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=34 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=35 name=(null) inode=15546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=36 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=37 name=(null) inode=15547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=38 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=39 name=(null) inode=15548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=40 name=(null) inode=15544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=41 name=(null) inode=15549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=42 name=(null) inode=15529 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=43 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=44 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=45 name=(null) inode=15551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=46 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=47 name=(null) inode=15552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=48 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=49 name=(null) inode=15553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=50 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=51 name=(null) inode=15554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=52 name=(null) inode=15550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=53 name=(null) inode=15555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=55 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=56 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=57 name=(null) inode=15557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=58 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=59 name=(null) inode=15558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=60 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=61 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=62 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=63 name=(null) inode=15560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=64 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=65 name=(null) inode=15561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=66 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=67 name=(null) inode=15562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=68 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=69 name=(null) inode=15563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=70 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=71 name=(null) inode=15564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=72 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=73 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=74 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=75 name=(null) inode=15566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=76 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=77 name=(null) inode=15567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=78 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=79 name=(null) inode=15568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=80 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=81 name=(null) inode=15569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=82 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=83 name=(null) inode=15570 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=84 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=85 name=(null) inode=15571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=86 name=(null) inode=15571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=87 name=(null) inode=15572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=88 name=(null) inode=15571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=89 name=(null) inode=15573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=90 name=(null) inode=15571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=91 name=(null) inode=15574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=92 name=(null) inode=15571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=93 name=(null) inode=15575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=94 name=(null) inode=15571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=95 name=(null) inode=15576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=96 name=(null) inode=15556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=97 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=98 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=99 name=(null) inode=15578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=100 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=101 name=(null) inode=15579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=102 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=103 name=(null) inode=15580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=104 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=105 name=(null) inode=15581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=106 name=(null) inode=15577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=107 name=(null) inode=15582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PATH item=109 name=(null) inode=15583 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:28:29.030000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:28:29.059121 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 14:28:29.080220 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:28:29.080351 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:28:29.080462 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:28:29.087159 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:28:29.096112 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:28:29.163703 kernel: kvm: Nested Virtualization enabled Dec 13 14:28:29.163801 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:28:29.165063 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:28:29.165110 kernel: SVM: Virtual GIF supported Dec 13 14:28:29.183114 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:28:29.207485 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:28:29.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.209754 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:28:29.220276 lvm[1058]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:28:29.250496 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:28:29.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.251790 systemd[1]: Reached target cryptsetup.target. Dec 13 14:28:29.254022 systemd[1]: Starting lvm2-activation.service... Dec 13 14:28:29.257953 lvm[1059]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:28:29.289181 systemd[1]: Finished lvm2-activation.service. Dec 13 14:28:29.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.290263 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:28:29.291190 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:28:29.291215 systemd[1]: Reached target local-fs.target. Dec 13 14:28:29.292043 systemd[1]: Reached target machines.target. Dec 13 14:28:29.293908 systemd[1]: Starting ldconfig.service... Dec 13 14:28:29.295019 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:28:29.295073 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:28:29.296137 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:28:29.298300 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:28:29.300775 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:28:29.302677 systemd[1]: Starting systemd-sysext.service... Dec 13 14:28:29.303771 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1061 (bootctl) Dec 13 14:28:29.304795 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:28:29.308430 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:28:29.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.314156 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:28:29.340835 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:28:29.341057 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:28:29.366116 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:28:29.673685 systemd-fsck[1069]: fsck.fat 4.2 (2021-01-31) Dec 13 14:28:29.673685 systemd-fsck[1069]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 14:28:29.674108 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:28:29.675721 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:28:29.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.679202 systemd[1]: Mounting boot.mount... Dec 13 14:28:29.714113 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:28:29.754157 systemd[1]: Mounted boot.mount. Dec 13 14:28:29.805186 (sd-sysext)[1074]: Using extensions 'kubernetes'. Dec 13 14:28:29.805655 (sd-sysext)[1074]: Merged extensions into '/usr'. Dec 13 14:28:29.821612 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:28:29.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.822929 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:28:29.825241 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:28:29.826334 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:28:29.827878 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:28:29.830003 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:28:29.832148 systemd[1]: Starting modprobe@loop.service... Dec 13 14:28:29.833128 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:28:29.833242 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:28:29.833343 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:28:29.835934 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:28:29.837166 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:28:29.837281 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:28:29.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.838601 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:28:29.838724 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:28:29.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.852000 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:28:29.852244 systemd[1]: Finished modprobe@loop.service. Dec 13 14:28:29.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.854064 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:28:29.854190 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:28:29.855406 systemd[1]: Finished systemd-sysext.service. Dec 13 14:28:29.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:29.871280 systemd[1]: Starting ensure-sysext.service... Dec 13 14:28:29.879406 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:28:29.884735 systemd[1]: Reloading. Dec 13 14:28:29.912861 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:28:29.914915 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:28:29.918794 systemd-tmpfiles[1081]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:28:29.958610 ldconfig[1060]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:28:30.033710 /usr/lib/systemd/system-generators/torcx-generator[1126]: time="2024-12-13T14:28:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:28:30.034111 /usr/lib/systemd/system-generators/torcx-generator[1126]: time="2024-12-13T14:28:30Z" level=info msg="torcx already run" Dec 13 14:28:30.111253 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:28:30.111274 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:28:30.132313 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:28:30.192000 audit: BPF prog-id=24 op=LOAD Dec 13 14:28:30.192000 audit: BPF prog-id=25 op=LOAD Dec 13 14:28:30.192000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:28:30.192000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:28:30.195000 audit: BPF prog-id=26 op=LOAD Dec 13 14:28:30.195000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:28:30.195000 audit: BPF prog-id=27 op=LOAD Dec 13 14:28:30.195000 audit: BPF prog-id=28 op=LOAD Dec 13 14:28:30.195000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:28:30.195000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:28:30.195000 audit: BPF prog-id=29 op=LOAD Dec 13 14:28:30.195000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:28:30.196000 audit: BPF prog-id=30 op=LOAD Dec 13 14:28:30.196000 audit: BPF prog-id=31 op=LOAD Dec 13 14:28:30.196000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:28:30.196000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:28:30.197000 audit: BPF prog-id=32 op=LOAD Dec 13 14:28:30.197000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:28:30.199411 systemd[1]: Finished ldconfig.service. Dec 13 14:28:30.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:30.200811 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:28:30.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:30.203014 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:28:30.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:30.207937 systemd[1]: Starting audit-rules.service... Dec 13 14:28:30.211429 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:28:30.213820 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:28:30.215000 audit: BPF prog-id=33 op=LOAD Dec 13 14:28:30.216993 systemd[1]: Starting systemd-resolved.service... Dec 13 14:28:30.218000 audit: BPF prog-id=34 op=LOAD Dec 13 14:28:30.220125 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:28:30.222474 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:28:30.224319 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:28:30.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:30.227000 audit[1157]: SYSTEM_BOOT pid=1157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:28:30.233774 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:28:30.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:30.237119 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:28:30.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:30.239685 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.241293 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:28:30.242000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:28:30.242000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc595b30b0 a2=420 a3=0 items=0 ppid=1144 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:30.242000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:28:30.242457 augenrules[1165]: No rules Dec 13 14:28:30.243635 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:28:30.245881 systemd[1]: Starting modprobe@loop.service... Dec 13 14:28:30.246920 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.247107 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:28:30.248524 systemd[1]: Starting systemd-update-done.service... Dec 13 14:28:30.249736 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:28:30.250957 systemd[1]: Finished audit-rules.service. Dec 13 14:28:30.252523 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:28:30.252700 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:28:30.254201 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:28:30.254349 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:28:30.255804 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:28:30.255908 systemd[1]: Finished modprobe@loop.service. Dec 13 14:28:30.257300 systemd[1]: Finished systemd-update-done.service. Dec 13 14:28:30.260411 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.262048 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:28:30.264602 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:28:30.267567 systemd[1]: Starting modprobe@loop.service... Dec 13 14:28:30.268850 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.269051 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:28:30.269250 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:28:30.270290 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:28:30.270477 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:28:30.271968 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:28:30.272072 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:28:30.273834 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:28:30.273983 systemd[1]: Finished modprobe@loop.service. Dec 13 14:28:30.277752 systemd-timesyncd[1155]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:28:30.277791 systemd-timesyncd[1155]: Initial clock synchronization to Fri 2024-12-13 14:28:30.558896 UTC. Dec 13 14:28:30.277936 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:28:30.280471 systemd[1]: Reached target time-set.target. Dec 13 14:28:30.280899 systemd-resolved[1151]: Positive Trust Anchors: Dec 13 14:28:30.280911 systemd-resolved[1151]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:28:30.280946 systemd-resolved[1151]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:28:30.282118 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.283786 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:28:30.285758 systemd[1]: Starting modprobe@drm.service... Dec 13 14:28:30.287683 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:28:30.289017 systemd-resolved[1151]: Defaulting to hostname 'linux'. Dec 13 14:28:30.289541 systemd[1]: Starting modprobe@loop.service... Dec 13 14:28:30.290423 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.290539 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:28:30.291710 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:28:30.292929 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:28:30.293761 systemd[1]: Started systemd-resolved.service. Dec 13 14:28:30.295093 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:28:30.295207 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:28:30.296438 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:28:30.296554 systemd[1]: Finished modprobe@drm.service. Dec 13 14:28:30.297693 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:28:30.297794 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:28:30.299050 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:28:30.299171 systemd[1]: Finished modprobe@loop.service. Dec 13 14:28:30.300512 systemd[1]: Reached target network.target. Dec 13 14:28:30.301433 systemd[1]: Reached target nss-lookup.target. Dec 13 14:28:30.302547 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:28:30.302579 systemd[1]: Reached target sysinit.target. Dec 13 14:28:30.303473 systemd[1]: Started motdgen.path. Dec 13 14:28:30.304255 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:28:30.305635 systemd[1]: Started logrotate.timer. Dec 13 14:28:30.306649 systemd[1]: Started mdadm.timer. Dec 13 14:28:30.307416 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:28:30.308336 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:28:30.308362 systemd[1]: Reached target paths.target. Dec 13 14:28:30.309162 systemd[1]: Reached target timers.target. Dec 13 14:28:30.310321 systemd[1]: Listening on dbus.socket. Dec 13 14:28:30.312209 systemd[1]: Starting docker.socket... Dec 13 14:28:30.318390 systemd[1]: Listening on sshd.socket. Dec 13 14:28:30.319430 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:28:30.319488 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.320172 systemd[1]: Finished ensure-sysext.service. Dec 13 14:28:30.321218 systemd[1]: Listening on docker.socket. Dec 13 14:28:30.322976 systemd[1]: Reached target sockets.target. Dec 13 14:28:30.323910 systemd[1]: Reached target basic.target. Dec 13 14:28:30.324850 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.324872 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:28:30.326103 systemd[1]: Starting containerd.service... Dec 13 14:28:30.327983 systemd[1]: Starting dbus.service... Dec 13 14:28:30.330206 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:28:30.333306 systemd[1]: Starting extend-filesystems.service... Dec 13 14:28:30.334442 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:28:30.335981 systemd[1]: Starting motdgen.service... Dec 13 14:28:30.337380 jq[1187]: false Dec 13 14:28:30.338998 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:28:30.341347 systemd[1]: Starting sshd-keygen.service... Dec 13 14:28:30.345095 systemd[1]: Starting systemd-logind.service... Dec 13 14:28:30.348209 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:28:30.348308 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:28:30.349297 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:28:30.350237 systemd[1]: Starting update-engine.service... Dec 13 14:28:30.352528 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:28:30.355649 extend-filesystems[1188]: Found loop1 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found sr0 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda1 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda2 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda3 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found usr Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda4 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda6 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda7 Dec 13 14:28:30.355649 extend-filesystems[1188]: Found vda9 Dec 13 14:28:30.355649 extend-filesystems[1188]: Checking size of /dev/vda9 Dec 13 14:28:30.355317 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:28:30.361733 dbus-daemon[1186]: [system] SELinux support is enabled Dec 13 14:28:30.371875 jq[1204]: true Dec 13 14:28:30.363902 systemd[1]: Started dbus.service. Dec 13 14:28:30.370525 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:28:30.370740 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:28:30.370997 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:28:30.371188 systemd[1]: Finished motdgen.service. Dec 13 14:28:30.373715 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:28:30.373840 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:28:30.407605 jq[1209]: true Dec 13 14:28:30.416661 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:28:30.416728 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:28:30.416749 systemd[1]: Reached target system-config.target. Dec 13 14:28:30.419100 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:28:30.419132 systemd[1]: Reached target user-config.target. Dec 13 14:28:30.420637 update_engine[1203]: I1213 14:28:30.420408 1203 main.cc:92] Flatcar Update Engine starting Dec 13 14:28:30.421146 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:28:30.422874 systemd[1]: Started update-engine.service. Dec 13 14:28:30.423002 update_engine[1203]: I1213 14:28:30.422969 1203 update_check_scheduler.cc:74] Next update check in 6m6s Dec 13 14:28:30.424996 extend-filesystems[1188]: Resized partition /dev/vda9 Dec 13 14:28:30.426721 systemd[1]: Started locksmithd.service. Dec 13 14:28:30.431826 extend-filesystems[1221]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:28:30.466098 systemd-logind[1197]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:28:30.466125 systemd-logind[1197]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:28:30.466387 systemd-logind[1197]: New seat seat0. Dec 13 14:28:30.468152 systemd[1]: Started systemd-logind.service. Dec 13 14:28:30.477105 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:28:30.527837 env[1210]: time="2024-12-13T14:28:30.526913843Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:28:30.532967 bash[1234]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:28:30.534104 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:28:30.535692 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:28:30.549486 env[1210]: time="2024-12-13T14:28:30.549437312Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:28:30.599060 env[1210]: time="2024-12-13T14:28:30.598743439Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:28:30.599146 extend-filesystems[1221]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:28:30.599146 extend-filesystems[1221]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:28:30.599146 extend-filesystems[1221]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:28:30.567367 locksmithd[1222]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600319184Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600367765Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600653741Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600668880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600681603Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600691502Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600760912Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.600975905Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.601103935Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:28:30.604861 env[1210]: time="2024-12-13T14:28:30.601116739Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:28:30.605049 extend-filesystems[1188]: Resized filesystem in /dev/vda9 Dec 13 14:28:30.600724 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:28:30.606065 env[1210]: time="2024-12-13T14:28:30.601157175Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:28:30.606065 env[1210]: time="2024-12-13T14:28:30.601167354Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:28:30.600872 systemd[1]: Finished extend-filesystems.service. Dec 13 14:28:30.663684 env[1210]: time="2024-12-13T14:28:30.663573268Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:28:30.663684 env[1210]: time="2024-12-13T14:28:30.663665601Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:28:30.663684 env[1210]: time="2024-12-13T14:28:30.663687392Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663749468Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663772161Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663788511Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663803009Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663818758Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663834267Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663854716Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663869764Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.663910 env[1210]: time="2024-12-13T14:28:30.663884361Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:28:30.664151 env[1210]: time="2024-12-13T14:28:30.664067394Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:28:30.664214 env[1210]: time="2024-12-13T14:28:30.664187630Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:28:30.664505 env[1210]: time="2024-12-13T14:28:30.664486641Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:28:30.664554 env[1210]: time="2024-12-13T14:28:30.664523089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664554 env[1210]: time="2024-12-13T14:28:30.664542345Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:28:30.664648 env[1210]: time="2024-12-13T14:28:30.664626703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664648 env[1210]: time="2024-12-13T14:28:30.664646731Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664749 env[1210]: time="2024-12-13T14:28:30.664662581Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664749 env[1210]: time="2024-12-13T14:28:30.664678330Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664749 env[1210]: time="2024-12-13T14:28:30.664693879Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664749 env[1210]: time="2024-12-13T14:28:30.664712544Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664749 env[1210]: time="2024-12-13T14:28:30.664725970Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664749 env[1210]: time="2024-12-13T14:28:30.664739014Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664945 env[1210]: time="2024-12-13T14:28:30.664756757Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:28:30.664945 env[1210]: time="2024-12-13T14:28:30.664903963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.664945 env[1210]: time="2024-12-13T14:28:30.664934430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.665019 env[1210]: time="2024-12-13T14:28:30.664951643Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.665019 env[1210]: time="2024-12-13T14:28:30.664991217Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:28:30.665019 env[1210]: time="2024-12-13T14:28:30.665009822Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:28:30.665111 env[1210]: time="2024-12-13T14:28:30.665022626Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:28:30.665111 env[1210]: time="2024-12-13T14:28:30.665044777Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:28:30.665161 env[1210]: time="2024-12-13T14:28:30.665107816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:28:30.665447 env[1210]: time="2024-12-13T14:28:30.665377742Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:28:30.666124 env[1210]: time="2024-12-13T14:28:30.665455337Z" level=info msg="Connect containerd service" Dec 13 14:28:30.666124 env[1210]: time="2024-12-13T14:28:30.665494040Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:28:30.666198 env[1210]: time="2024-12-13T14:28:30.666163856Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:28:30.666347 env[1210]: time="2024-12-13T14:28:30.666311202Z" level=info msg="Start subscribing containerd event" Dec 13 14:28:30.666419 env[1210]: time="2024-12-13T14:28:30.666379220Z" level=info msg="Start recovering state" Dec 13 14:28:30.666457 env[1210]: time="2024-12-13T14:28:30.666435255Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:28:30.666494 env[1210]: time="2024-12-13T14:28:30.666463318Z" level=info msg="Start event monitor" Dec 13 14:28:30.666494 env[1210]: time="2024-12-13T14:28:30.666476142Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:28:30.666494 env[1210]: time="2024-12-13T14:28:30.666488154Z" level=info msg="Start snapshots syncer" Dec 13 14:28:30.666580 env[1210]: time="2024-12-13T14:28:30.666508863Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:28:30.666580 env[1210]: time="2024-12-13T14:28:30.666519072Z" level=info msg="Start streaming server" Dec 13 14:28:30.666594 systemd[1]: Started containerd.service. Dec 13 14:28:30.668141 env[1210]: time="2024-12-13T14:28:30.667898058Z" level=info msg="containerd successfully booted in 0.149056s" Dec 13 14:28:30.717328 systemd-networkd[1029]: eth0: Gained IPv6LL Dec 13 14:28:30.720031 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:28:30.721766 systemd[1]: Reached target network-online.target. Dec 13 14:28:30.724565 systemd[1]: Starting kubelet.service... Dec 13 14:28:31.820277 sshd_keygen[1206]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:28:31.844741 systemd[1]: Finished sshd-keygen.service. Dec 13 14:28:31.847702 systemd[1]: Starting issuegen.service... Dec 13 14:28:31.852093 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:28:31.852274 systemd[1]: Finished issuegen.service. Dec 13 14:28:31.854549 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:28:31.861145 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:28:31.863729 systemd[1]: Started getty@tty1.service. Dec 13 14:28:31.867326 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:28:31.868804 systemd[1]: Reached target getty.target. Dec 13 14:28:31.884249 systemd[1]: Started kubelet.service. Dec 13 14:28:31.885839 systemd[1]: Reached target multi-user.target. Dec 13 14:28:31.888421 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:28:31.896531 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:28:31.896664 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:28:31.897862 systemd[1]: Startup finished in 612ms (kernel) + 4.141s (initrd) + 7.052s (userspace) = 11.805s. Dec 13 14:28:32.778796 kubelet[1263]: E1213 14:28:32.778696 1263 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:28:32.780746 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:28:32.780907 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:28:32.781191 systemd[1]: kubelet.service: Consumed 1.810s CPU time. Dec 13 14:28:39.974314 systemd[1]: Created slice system-sshd.slice. Dec 13 14:28:39.975255 systemd[1]: Started sshd@0-10.0.0.122:22-10.0.0.1:58490.service. Dec 13 14:28:40.009874 sshd[1273]: Accepted publickey for core from 10.0.0.1 port 58490 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:40.011529 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.020352 systemd[1]: Created slice user-500.slice. Dec 13 14:28:40.021412 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:28:40.023326 systemd-logind[1197]: New session 1 of user core. Dec 13 14:28:40.029503 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:28:40.030841 systemd[1]: Starting user@500.service... Dec 13 14:28:40.033543 (systemd)[1276]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.122581 systemd[1276]: Queued start job for default target default.target. Dec 13 14:28:40.122980 systemd[1276]: Reached target paths.target. Dec 13 14:28:40.123000 systemd[1276]: Reached target sockets.target. Dec 13 14:28:40.123012 systemd[1276]: Reached target timers.target. Dec 13 14:28:40.123022 systemd[1276]: Reached target basic.target. Dec 13 14:28:40.123060 systemd[1276]: Reached target default.target. Dec 13 14:28:40.123113 systemd[1276]: Startup finished in 83ms. Dec 13 14:28:40.123181 systemd[1]: Started user@500.service. Dec 13 14:28:40.124030 systemd[1]: Started session-1.scope. Dec 13 14:28:40.174649 systemd[1]: Started sshd@1-10.0.0.122:22-10.0.0.1:58504.service. Dec 13 14:28:40.207731 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 58504 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:40.208659 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.211927 systemd-logind[1197]: New session 2 of user core. Dec 13 14:28:40.212983 systemd[1]: Started session-2.scope. Dec 13 14:28:40.267310 sshd[1285]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:40.269562 systemd[1]: sshd@1-10.0.0.122:22-10.0.0.1:58504.service: Deactivated successfully. Dec 13 14:28:40.270176 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:28:40.270663 systemd-logind[1197]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:28:40.271662 systemd[1]: Started sshd@2-10.0.0.122:22-10.0.0.1:58520.service. Dec 13 14:28:40.272323 systemd-logind[1197]: Removed session 2. Dec 13 14:28:40.300747 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 58520 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:40.301884 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.305234 systemd-logind[1197]: New session 3 of user core. Dec 13 14:28:40.306157 systemd[1]: Started session-3.scope. Dec 13 14:28:40.356923 sshd[1291]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:40.360081 systemd[1]: sshd@2-10.0.0.122:22-10.0.0.1:58520.service: Deactivated successfully. Dec 13 14:28:40.360670 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:28:40.361252 systemd-logind[1197]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:28:40.362419 systemd[1]: Started sshd@3-10.0.0.122:22-10.0.0.1:58522.service. Dec 13 14:28:40.363078 systemd-logind[1197]: Removed session 3. Dec 13 14:28:40.392358 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 58522 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:40.393449 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.397108 systemd-logind[1197]: New session 4 of user core. Dec 13 14:28:40.397930 systemd[1]: Started session-4.scope. Dec 13 14:28:40.453278 sshd[1297]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:40.456033 systemd[1]: sshd@3-10.0.0.122:22-10.0.0.1:58522.service: Deactivated successfully. Dec 13 14:28:40.456638 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:28:40.457316 systemd-logind[1197]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:28:40.458364 systemd[1]: Started sshd@4-10.0.0.122:22-10.0.0.1:58530.service. Dec 13 14:28:40.459197 systemd-logind[1197]: Removed session 4. Dec 13 14:28:40.490161 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 58530 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:40.491464 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.494979 systemd-logind[1197]: New session 5 of user core. Dec 13 14:28:40.495814 systemd[1]: Started session-5.scope. Dec 13 14:28:40.552597 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:28:40.552777 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:28:40.562317 dbus-daemon[1186]: Н\xfb5\u001aV: received setenforce notice (enforcing=1855473808) Dec 13 14:28:40.564174 sudo[1306]: pam_unix(sudo:session): session closed for user root Dec 13 14:28:40.565952 sshd[1303]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:40.568631 systemd[1]: sshd@4-10.0.0.122:22-10.0.0.1:58530.service: Deactivated successfully. Dec 13 14:28:40.569111 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:28:40.569606 systemd-logind[1197]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:28:40.570436 systemd[1]: Started sshd@5-10.0.0.122:22-10.0.0.1:58540.service. Dec 13 14:28:40.571040 systemd-logind[1197]: Removed session 5. Dec 13 14:28:40.602112 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 58540 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:40.603214 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.606476 systemd-logind[1197]: New session 6 of user core. Dec 13 14:28:40.607280 systemd[1]: Started session-6.scope. Dec 13 14:28:40.661935 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:28:40.662128 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:28:40.664861 sudo[1314]: pam_unix(sudo:session): session closed for user root Dec 13 14:28:40.669366 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:28:40.669551 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:28:40.678716 systemd[1]: Stopping audit-rules.service... Dec 13 14:28:40.678000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:28:40.679921 auditctl[1317]: No rules Dec 13 14:28:40.680315 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:28:40.680472 systemd[1]: Stopped audit-rules.service. Dec 13 14:28:40.680669 kernel: kauditd_printk_skb: 207 callbacks suppressed Dec 13 14:28:40.680720 kernel: audit: type=1305 audit(1734100120.678:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:28:40.681824 systemd[1]: Starting audit-rules.service... Dec 13 14:28:40.678000 audit[1317]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4e2a4750 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:40.687073 kernel: audit: type=1300 audit(1734100120.678:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff4e2a4750 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:40.687135 kernel: audit: type=1327 audit(1734100120.678:184): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:28:40.678000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:28:40.696440 augenrules[1334]: No rules Dec 13 14:28:40.697073 systemd[1]: Finished audit-rules.service. Dec 13 14:28:40.698225 sudo[1313]: pam_unix(sudo:session): session closed for user root Dec 13 14:28:40.715346 kernel: audit: type=1131 audit(1734100120.679:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.714685 sshd[1310]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:40.717792 systemd[1]: sshd@5-10.0.0.122:22-10.0.0.1:58540.service: Deactivated successfully. Dec 13 14:28:40.717880 kernel: audit: type=1130 audit(1734100120.696:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.718502 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:28:40.719111 systemd-logind[1197]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:28:40.720186 systemd[1]: Started sshd@6-10.0.0.122:22-10.0.0.1:58552.service. Dec 13 14:28:40.721002 kernel: audit: type=1106 audit(1734100120.697:187): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.697000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.721385 systemd-logind[1197]: Removed session 6. Dec 13 14:28:40.697000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.747082 kernel: audit: type=1104 audit(1734100120.697:188): pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.747321 kernel: audit: type=1106 audit(1734100120.714:189): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.714000 audit[1310]: USER_END pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.714000 audit[1310]: CRED_DISP pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.755221 kernel: audit: type=1104 audit(1734100120.714:190): pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.755278 kernel: audit: type=1131 audit(1734100120.716:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.122:22-10.0.0.1:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.122:22-10.0.0.1:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.122:22-10.0.0.1:58552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.764000 audit[1340]: USER_ACCT pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.765444 sshd[1340]: Accepted publickey for core from 10.0.0.1 port 58552 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:28:40.765000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.765000 audit[1340]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce4ad6910 a2=3 a3=0 items=0 ppid=1 pid=1340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:40.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:40.766699 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:40.770614 systemd-logind[1197]: New session 7 of user core. Dec 13 14:28:40.771519 systemd[1]: Started session-7.scope. Dec 13 14:28:40.775000 audit[1340]: USER_START pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.776000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:40.825000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.825000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.825230 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:28:40.825465 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:28:40.827000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.838008 systemd[1]: Starting coreos-metadata.service... Dec 13 14:28:40.844871 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 14:28:40.845007 systemd[1]: Finished coreos-metadata.service. Dec 13 14:28:40.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:40.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:41.855580 systemd[1]: Stopped kubelet.service. Dec 13 14:28:41.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:41.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:41.855725 systemd[1]: kubelet.service: Consumed 1.810s CPU time. Dec 13 14:28:41.857569 systemd[1]: Starting kubelet.service... Dec 13 14:28:41.874677 systemd[1]: Reloading. Dec 13 14:28:41.951834 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:28:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:28:41.951868 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:28:41Z" level=info msg="torcx already run" Dec 13 14:28:42.192191 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:28:42.192217 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:28:42.215074 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.293000 audit: BPF prog-id=40 op=LOAD Dec 13 14:28:42.293000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit: BPF prog-id=41 op=LOAD Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit: BPF prog-id=42 op=LOAD Dec 13 14:28:42.294000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:28:42.294000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit: BPF prog-id=43 op=LOAD Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.294000 audit: BPF prog-id=44 op=LOAD Dec 13 14:28:42.294000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:28:42.294000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.296000 audit: BPF prog-id=45 op=LOAD Dec 13 14:28:42.296000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.298000 audit: BPF prog-id=46 op=LOAD Dec 13 14:28:42.298000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.300000 audit: BPF prog-id=47 op=LOAD Dec 13 14:28:42.300000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit: BPF prog-id=48 op=LOAD Dec 13 14:28:42.302000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit: BPF prog-id=49 op=LOAD Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.302000 audit: BPF prog-id=50 op=LOAD Dec 13 14:28:42.302000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:28:42.302000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit: BPF prog-id=51 op=LOAD Dec 13 14:28:42.303000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit: BPF prog-id=52 op=LOAD Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.303000 audit: BPF prog-id=53 op=LOAD Dec 13 14:28:42.303000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:28:42.303000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.305000 audit: BPF prog-id=54 op=LOAD Dec 13 14:28:42.305000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:28:42.316566 systemd[1]: Started kubelet.service. Dec 13 14:28:42.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:42.320341 systemd[1]: Stopping kubelet.service... Dec 13 14:28:42.320825 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:28:42.321024 systemd[1]: Stopped kubelet.service. Dec 13 14:28:42.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:42.322720 systemd[1]: Starting kubelet.service... Dec 13 14:28:42.402255 systemd[1]: Started kubelet.service. Dec 13 14:28:42.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:42.489232 kubelet[1456]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:42.489232 kubelet[1456]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:28:42.489232 kubelet[1456]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:42.489779 kubelet[1456]: I1213 14:28:42.489268 1456 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:28:42.724544 kubelet[1456]: I1213 14:28:42.724503 1456 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:28:42.724544 kubelet[1456]: I1213 14:28:42.724534 1456 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:28:42.724761 kubelet[1456]: I1213 14:28:42.724743 1456 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:28:42.764585 kubelet[1456]: I1213 14:28:42.764410 1456 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:28:42.786124 kubelet[1456]: I1213 14:28:42.786035 1456 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:28:42.788758 kubelet[1456]: I1213 14:28:42.788728 1456 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:28:42.788955 kubelet[1456]: I1213 14:28:42.788932 1456 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:28:42.789182 kubelet[1456]: I1213 14:28:42.788961 1456 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:28:42.789182 kubelet[1456]: I1213 14:28:42.788970 1456 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:28:42.789182 kubelet[1456]: I1213 14:28:42.789138 1456 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:42.789266 kubelet[1456]: I1213 14:28:42.789258 1456 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:28:42.789288 kubelet[1456]: I1213 14:28:42.789280 1456 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:28:42.789330 kubelet[1456]: I1213 14:28:42.789316 1456 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:28:42.789365 kubelet[1456]: I1213 14:28:42.789343 1456 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:28:42.789452 kubelet[1456]: E1213 14:28:42.789423 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:42.789622 kubelet[1456]: E1213 14:28:42.789585 1456 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:42.790904 kubelet[1456]: I1213 14:28:42.790878 1456 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:28:42.794303 kubelet[1456]: W1213 14:28:42.794254 1456 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.0.0.122" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:28:42.794303 kubelet[1456]: W1213 14:28:42.794295 1456 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:28:42.794303 kubelet[1456]: E1213 14:28:42.794311 1456 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.122" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:28:42.794303 kubelet[1456]: E1213 14:28:42.794319 1456 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:28:42.799744 kubelet[1456]: I1213 14:28:42.799713 1456 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:28:42.799828 kubelet[1456]: W1213 14:28:42.799812 1456 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:28:42.800508 kubelet[1456]: I1213 14:28:42.800488 1456 server.go:1256] "Started kubelet" Dec 13 14:28:42.800683 kubelet[1456]: I1213 14:28:42.800640 1456 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:28:42.801475 kubelet[1456]: I1213 14:28:42.801008 1456 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:28:42.801475 kubelet[1456]: I1213 14:28:42.801064 1456 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:28:42.800000 audit[1456]: AVC avc: denied { mac_admin } for pid=1456 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.800000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:42.800000 audit[1456]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000727470 a1=c000648fd8 a2=c000727440 a3=25 items=0 ppid=1 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:42.800000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:42.800000 audit[1456]: AVC avc: denied { mac_admin } for pid=1456 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:42.800000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:42.800000 audit[1456]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c1f080 a1=c000648ff0 a2=c000727500 a3=25 items=0 ppid=1 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:42.800000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:42.802250 kubelet[1456]: I1213 14:28:42.801968 1456 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:28:42.802250 kubelet[1456]: I1213 14:28:42.802007 1456 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:28:42.802250 kubelet[1456]: I1213 14:28:42.802121 1456 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:28:42.802374 kubelet[1456]: I1213 14:28:42.802360 1456 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:28:42.810713 kubelet[1456]: E1213 14:28:42.810671 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.122\" not found" Dec 13 14:28:42.810713 kubelet[1456]: I1213 14:28:42.810717 1456 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:28:42.810862 kubelet[1456]: I1213 14:28:42.810800 1456 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:28:42.810923 kubelet[1456]: I1213 14:28:42.810893 1456 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:28:42.812657 kubelet[1456]: I1213 14:28:42.812633 1456 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:28:42.812872 kubelet[1456]: I1213 14:28:42.812847 1456 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:28:42.816786 kubelet[1456]: E1213 14:28:42.816765 1456 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:28:42.817033 kubelet[1456]: I1213 14:28:42.817005 1456 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:28:42.817923 kubelet[1456]: E1213 14:28:42.817900 1456 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.122\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:28:42.818339 kubelet[1456]: W1213 14:28:42.818320 1456 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:28:42.818462 kubelet[1456]: E1213 14:28:42.818445 1456 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:28:42.835233 kubelet[1456]: I1213 14:28:42.835192 1456 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:28:42.835233 kubelet[1456]: I1213 14:28:42.835228 1456 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:28:42.835440 kubelet[1456]: I1213 14:28:42.835270 1456 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:42.845000 audit[1469]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:42.845000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdee9a6e40 a2=0 a3=7ffdee9a6e2c items=0 ppid=1456 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:42.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:28:42.846000 audit[1476]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:42.846000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffeee21a6e0 a2=0 a3=7ffeee21a6cc items=0 ppid=1456 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:42.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:28:42.911900 kubelet[1456]: I1213 14:28:42.911851 1456 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.122" Dec 13 14:28:42.849000 audit[1478]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:42.849000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc62e13800 a2=0 a3=7ffc62e137ec items=0 ppid=1456 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:42.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:43.003277 kubelet[1456]: I1213 14:28:43.003231 1456 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.122" Dec 13 14:28:43.004000 audit[1483]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:43.004000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb6cc4b70 a2=0 a3=7ffdb6cc4b5c items=0 ppid=1456 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:43.025764 kubelet[1456]: I1213 14:28:43.025628 1456 policy_none.go:49] "None policy: Start" Dec 13 14:28:43.026938 kubelet[1456]: I1213 14:28:43.026918 1456 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:28:43.027218 kubelet[1456]: I1213 14:28:43.027209 1456 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:28:43.046000 audit[1488]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:43.046000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe3e3fba10 a2=0 a3=7ffe3e3fb9fc items=0 ppid=1456 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:28:43.048215 kubelet[1456]: I1213 14:28:43.048162 1456 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:28:43.047000 audit[1489]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:43.047000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd15954b20 a2=0 a3=7ffd15954b0c items=0 ppid=1456 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:28:43.048000 audit[1490]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:43.048000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff58dc29f0 a2=0 a3=7fff58dc29dc items=0 ppid=1456 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:28:43.049562 kubelet[1456]: I1213 14:28:43.049529 1456 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:28:43.049615 kubelet[1456]: I1213 14:28:43.049580 1456 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:28:43.049615 kubelet[1456]: I1213 14:28:43.049611 1456 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:28:43.049768 kubelet[1456]: E1213 14:28:43.049737 1456 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:28:43.050805 systemd[1]: Created slice kubepods.slice. Dec 13 14:28:43.050000 audit[1492]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:43.050000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdeab37640 a2=0 a3=7ffdeab3762c items=0 ppid=1456 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:28:43.050000 audit[1491]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:43.050000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe17cf840 a2=0 a3=7fffe17cf82c items=0 ppid=1456 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:28:43.051000 audit[1493]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:43.051000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec85e9550 a2=0 a3=7ffec85e953c items=0 ppid=1456 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:28:43.051000 audit[1494]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:43.051000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe6ebadf60 a2=0 a3=7ffe6ebadf4c items=0 ppid=1456 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:28:43.053000 audit[1495]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:43.053000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6fb3d6b0 a2=0 a3=7ffc6fb3d69c items=0 ppid=1456 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:28:43.056048 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:28:43.064183 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:28:43.065372 kubelet[1456]: I1213 14:28:43.065329 1456 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:28:43.064000 audit[1456]: AVC avc: denied { mac_admin } for pid=1456 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.064000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:43.064000 audit[1456]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d3acc0 a1=c000f8a240 a2=c000d3ac90 a3=25 items=0 ppid=1 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:43.065748 kubelet[1456]: I1213 14:28:43.065425 1456 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:28:43.065748 kubelet[1456]: I1213 14:28:43.065592 1456 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:28:43.066885 kubelet[1456]: E1213 14:28:43.066832 1456 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.122\" not found" Dec 13 14:28:43.084882 kubelet[1456]: E1213 14:28:43.084811 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.122\" not found" Dec 13 14:28:43.185200 kubelet[1456]: E1213 14:28:43.185066 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.122\" not found" Dec 13 14:28:43.285858 kubelet[1456]: E1213 14:28:43.285697 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.122\" not found" Dec 13 14:28:43.386206 kubelet[1456]: E1213 14:28:43.386137 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.122\" not found" Dec 13 14:28:43.487261 kubelet[1456]: E1213 14:28:43.487183 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.122\" not found" Dec 13 14:28:43.587763 kubelet[1456]: E1213 14:28:43.587610 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.122\" not found" Dec 13 14:28:43.689131 kubelet[1456]: I1213 14:28:43.689075 1456 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:28:43.689570 env[1210]: time="2024-12-13T14:28:43.689524029Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:28:43.689892 kubelet[1456]: I1213 14:28:43.689874 1456 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:28:43.726365 kubelet[1456]: I1213 14:28:43.726310 1456 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:28:43.726615 kubelet[1456]: W1213 14:28:43.726596 1456 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Node ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:28:43.726683 kubelet[1456]: W1213 14:28:43.726644 1456 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:28:43.790347 kubelet[1456]: I1213 14:28:43.790274 1456 apiserver.go:52] "Watching apiserver" Dec 13 14:28:43.790347 kubelet[1456]: E1213 14:28:43.790310 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:43.799341 kubelet[1456]: I1213 14:28:43.799300 1456 topology_manager.go:215] "Topology Admit Handler" podUID="e0b876c8-a2a3-4b6a-ad31-377206faa1f9" podNamespace="kube-system" podName="kube-proxy-8zvvx" Dec 13 14:28:43.799506 kubelet[1456]: I1213 14:28:43.799433 1456 topology_manager.go:215] "Topology Admit Handler" podUID="da97e087-56c3-43dd-ae06-cf4e17b846d2" podNamespace="calico-system" podName="calico-node-nw754" Dec 13 14:28:43.799506 kubelet[1456]: I1213 14:28:43.799502 1456 topology_manager.go:215] "Topology Admit Handler" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" podNamespace="calico-system" podName="csi-node-driver-x6c6z" Dec 13 14:28:43.799736 kubelet[1456]: E1213 14:28:43.799702 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:43.806274 systemd[1]: Created slice kubepods-besteffort-pode0b876c8_a2a3_4b6a_ad31_377206faa1f9.slice. Dec 13 14:28:43.811768 kubelet[1456]: I1213 14:28:43.811734 1456 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:28:43.818307 systemd[1]: Created slice kubepods-besteffort-podda97e087_56c3_43dd_ae06_cf4e17b846d2.slice. Dec 13 14:28:43.819156 kubelet[1456]: I1213 14:28:43.819075 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-989qk\" (UniqueName: \"kubernetes.io/projected/e0b876c8-a2a3-4b6a-ad31-377206faa1f9-kube-api-access-989qk\") pod \"kube-proxy-8zvvx\" (UID: \"e0b876c8-a2a3-4b6a-ad31-377206faa1f9\") " pod="kube-system/kube-proxy-8zvvx" Dec 13 14:28:43.819223 kubelet[1456]: I1213 14:28:43.819205 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-cni-bin-dir\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.819307 kubelet[1456]: I1213 14:28:43.819285 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/87428686-7d73-49c2-b3cb-f621cf2c9a13-varrun\") pod \"csi-node-driver-x6c6z\" (UID: \"87428686-7d73-49c2-b3cb-f621cf2c9a13\") " pod="calico-system/csi-node-driver-x6c6z" Dec 13 14:28:43.819761 kubelet[1456]: I1213 14:28:43.819730 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/87428686-7d73-49c2-b3cb-f621cf2c9a13-kubelet-dir\") pod \"csi-node-driver-x6c6z\" (UID: \"87428686-7d73-49c2-b3cb-f621cf2c9a13\") " pod="calico-system/csi-node-driver-x6c6z" Dec 13 14:28:43.819823 kubelet[1456]: I1213 14:28:43.819774 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/87428686-7d73-49c2-b3cb-f621cf2c9a13-socket-dir\") pod \"csi-node-driver-x6c6z\" (UID: \"87428686-7d73-49c2-b3cb-f621cf2c9a13\") " pod="calico-system/csi-node-driver-x6c6z" Dec 13 14:28:43.819823 kubelet[1456]: I1213 14:28:43.819797 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-lib-modules\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.819823 kubelet[1456]: I1213 14:28:43.819815 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/da97e087-56c3-43dd-ae06-cf4e17b846d2-tigera-ca-bundle\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.819922 kubelet[1456]: I1213 14:28:43.819842 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-var-run-calico\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.819922 kubelet[1456]: I1213 14:28:43.819865 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-cni-net-dir\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.819922 kubelet[1456]: I1213 14:28:43.819890 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/da97e087-56c3-43dd-ae06-cf4e17b846d2-node-certs\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.819922 kubelet[1456]: I1213 14:28:43.819908 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-cni-log-dir\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.820038 kubelet[1456]: I1213 14:28:43.819948 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-flexvol-driver-host\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.820038 kubelet[1456]: I1213 14:28:43.819974 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w47wn\" (UniqueName: \"kubernetes.io/projected/da97e087-56c3-43dd-ae06-cf4e17b846d2-kube-api-access-w47wn\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.820038 kubelet[1456]: I1213 14:28:43.819996 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e0b876c8-a2a3-4b6a-ad31-377206faa1f9-kube-proxy\") pod \"kube-proxy-8zvvx\" (UID: \"e0b876c8-a2a3-4b6a-ad31-377206faa1f9\") " pod="kube-system/kube-proxy-8zvvx" Dec 13 14:28:43.820038 kubelet[1456]: I1213 14:28:43.820017 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e0b876c8-a2a3-4b6a-ad31-377206faa1f9-xtables-lock\") pod \"kube-proxy-8zvvx\" (UID: \"e0b876c8-a2a3-4b6a-ad31-377206faa1f9\") " pod="kube-system/kube-proxy-8zvvx" Dec 13 14:28:43.820038 kubelet[1456]: I1213 14:28:43.820036 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e0b876c8-a2a3-4b6a-ad31-377206faa1f9-lib-modules\") pod \"kube-proxy-8zvvx\" (UID: \"e0b876c8-a2a3-4b6a-ad31-377206faa1f9\") " pod="kube-system/kube-proxy-8zvvx" Dec 13 14:28:43.820206 kubelet[1456]: I1213 14:28:43.820077 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-xtables-lock\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.820341 kubelet[1456]: I1213 14:28:43.820317 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jh989\" (UniqueName: \"kubernetes.io/projected/87428686-7d73-49c2-b3cb-f621cf2c9a13-kube-api-access-jh989\") pod \"csi-node-driver-x6c6z\" (UID: \"87428686-7d73-49c2-b3cb-f621cf2c9a13\") " pod="calico-system/csi-node-driver-x6c6z" Dec 13 14:28:43.820402 kubelet[1456]: I1213 14:28:43.820355 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-policysync\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.820402 kubelet[1456]: I1213 14:28:43.820399 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/da97e087-56c3-43dd-ae06-cf4e17b846d2-var-lib-calico\") pod \"calico-node-nw754\" (UID: \"da97e087-56c3-43dd-ae06-cf4e17b846d2\") " pod="calico-system/calico-node-nw754" Dec 13 14:28:43.820463 kubelet[1456]: I1213 14:28:43.820429 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/87428686-7d73-49c2-b3cb-f621cf2c9a13-registration-dir\") pod \"csi-node-driver-x6c6z\" (UID: \"87428686-7d73-49c2-b3cb-f621cf2c9a13\") " pod="calico-system/csi-node-driver-x6c6z" Dec 13 14:28:43.922273 kubelet[1456]: E1213 14:28:43.922097 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.922273 kubelet[1456]: W1213 14:28:43.922124 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.922273 kubelet[1456]: E1213 14:28:43.922151 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.922134 sudo[1343]: pam_unix(sudo:session): session closed for user root Dec 13 14:28:43.921000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:43.921000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:43.923389 kubelet[1456]: E1213 14:28:43.923351 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.923472 kubelet[1456]: W1213 14:28:43.923388 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.923472 kubelet[1456]: E1213 14:28:43.923441 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.923690 sshd[1340]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:43.924740 kubelet[1456]: E1213 14:28:43.924140 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.924740 kubelet[1456]: W1213 14:28:43.924152 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.924740 kubelet[1456]: E1213 14:28:43.924261 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.924740 kubelet[1456]: E1213 14:28:43.924408 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.924740 kubelet[1456]: W1213 14:28:43.924417 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.924740 kubelet[1456]: E1213 14:28:43.924488 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.924740 kubelet[1456]: E1213 14:28:43.924613 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.924740 kubelet[1456]: W1213 14:28:43.924621 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.924740 kubelet[1456]: E1213 14:28:43.924711 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.925132 kubelet[1456]: E1213 14:28:43.924828 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.925132 kubelet[1456]: W1213 14:28:43.924837 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.925132 kubelet[1456]: E1213 14:28:43.924855 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.925132 kubelet[1456]: E1213 14:28:43.925088 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.925132 kubelet[1456]: W1213 14:28:43.925098 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.925132 kubelet[1456]: E1213 14:28:43.925112 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.924000 audit[1340]: USER_END pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:43.924000 audit[1340]: CRED_DISP pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:43.926225 kubelet[1456]: E1213 14:28:43.925799 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.926225 kubelet[1456]: W1213 14:28:43.925815 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.926225 kubelet[1456]: E1213 14:28:43.925829 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.926225 kubelet[1456]: E1213 14:28:43.926054 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.926225 kubelet[1456]: W1213 14:28:43.926063 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.926225 kubelet[1456]: E1213 14:28:43.926077 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.927105 kubelet[1456]: E1213 14:28:43.927073 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.927184 kubelet[1456]: W1213 14:28:43.927164 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.927269 kubelet[1456]: E1213 14:28:43.927253 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.928806 systemd[1]: sshd@6-10.0.0.122:22-10.0.0.1:58552.service: Deactivated successfully. Dec 13 14:28:43.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.122:22-10.0.0.1:58552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:43.929422 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:28:43.930799 systemd-logind[1197]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:28:43.932631 kubelet[1456]: E1213 14:28:43.932600 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.932631 kubelet[1456]: W1213 14:28:43.932619 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.932775 kubelet[1456]: E1213 14:28:43.932643 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.937459 kubelet[1456]: E1213 14:28:43.937435 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.937459 kubelet[1456]: W1213 14:28:43.937452 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.937585 kubelet[1456]: E1213 14:28:43.937471 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.939627 kubelet[1456]: E1213 14:28:43.939595 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:43.939627 kubelet[1456]: W1213 14:28:43.939615 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:43.939769 kubelet[1456]: E1213 14:28:43.939638 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:43.942462 systemd-logind[1197]: Removed session 7. Dec 13 14:28:44.117183 kubelet[1456]: E1213 14:28:44.117138 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:44.117955 env[1210]: time="2024-12-13T14:28:44.117906564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8zvvx,Uid:e0b876c8-a2a3-4b6a-ad31-377206faa1f9,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:44.121170 kubelet[1456]: E1213 14:28:44.121136 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:44.121714 env[1210]: time="2024-12-13T14:28:44.121673859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nw754,Uid:da97e087-56c3-43dd-ae06-cf4e17b846d2,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:44.791322 kubelet[1456]: E1213 14:28:44.791255 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:45.050666 kubelet[1456]: E1213 14:28:45.050512 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:45.791506 kubelet[1456]: E1213 14:28:45.791434 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:45.915730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2343424403.mount: Deactivated successfully. Dec 13 14:28:45.926600 env[1210]: time="2024-12-13T14:28:45.926504171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:45.928028 env[1210]: time="2024-12-13T14:28:45.927956510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:45.943461 env[1210]: time="2024-12-13T14:28:45.943364389Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:45.944915 env[1210]: time="2024-12-13T14:28:45.944863961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:45.946595 env[1210]: time="2024-12-13T14:28:45.946539992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:45.948495 env[1210]: time="2024-12-13T14:28:45.948448381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:45.950293 env[1210]: time="2024-12-13T14:28:45.950232820Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:45.951796 env[1210]: time="2024-12-13T14:28:45.951734698Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:46.181867 env[1210]: time="2024-12-13T14:28:46.181356855Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:46.181867 env[1210]: time="2024-12-13T14:28:46.181399214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:46.181867 env[1210]: time="2024-12-13T14:28:46.181412492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:46.182150 env[1210]: time="2024-12-13T14:28:46.181539679Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ece5c13cf6e01c2804bf5e52febcc98e7855db7d4e5924433cda0750fee8372 pid=1527 runtime=io.containerd.runc.v2 Dec 13 14:28:46.186558 env[1210]: time="2024-12-13T14:28:46.182050827Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:46.186558 env[1210]: time="2024-12-13T14:28:46.182116892Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:46.186558 env[1210]: time="2024-12-13T14:28:46.182136520Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:46.186558 env[1210]: time="2024-12-13T14:28:46.182314815Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583 pid=1533 runtime=io.containerd.runc.v2 Dec 13 14:28:46.326507 systemd[1]: Started cri-containerd-0ece5c13cf6e01c2804bf5e52febcc98e7855db7d4e5924433cda0750fee8372.scope. Dec 13 14:28:46.332256 systemd[1]: Started cri-containerd-7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583.scope. Dec 13 14:28:46.351130 kernel: kauditd_printk_skb: 243 callbacks suppressed Dec 13 14:28:46.351297 kernel: audit: type=1400 audit(1734100126.348:400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.368544 kernel: audit: type=1400 audit(1734100126.348:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.368728 kernel: audit: type=1400 audit(1734100126.348:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.368752 kernel: audit: type=1400 audit(1734100126.348:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.368772 kernel: audit: type=1400 audit(1734100126.348:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.372428 kernel: audit: type=1400 audit(1734100126.348:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.375948 kernel: audit: type=1400 audit(1734100126.348:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.376069 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:28:46.376120 kernel: audit: type=1400 audit(1734100126.348:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.377208 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:28:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.352000 audit: BPF prog-id=55 op=LOAD Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1527 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065636535633133636636653031633238303462663565353266656263 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1527 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065636535633133636636653031633238303462663565353266656263 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.353000 audit: BPF prog-id=56 op=LOAD Dec 13 14:28:46.353000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000354a10 items=0 ppid=1527 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065636535633133636636653031633238303462663565353266656263 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.356000 audit: BPF prog-id=57 op=LOAD Dec 13 14:28:46.356000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000354a58 items=0 ppid=1527 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065636535633133636636653031633238303462663565353266656263 Dec 13 14:28:46.363000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:28:46.363000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.363000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.371000 audit: BPF prog-id=59 op=LOAD Dec 13 14:28:46.363000 audit: BPF prog-id=58 op=LOAD Dec 13 14:28:46.363000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354e68 items=0 ppid=1527 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065636535633133636636653031633238303462663565353266656263 Dec 13 14:28:46.375000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.375000 audit[1552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1533 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761363034343266616335313937626436356130663062646437363232 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit: BPF prog-id=60 op=LOAD Dec 13 14:28:46.381000 audit[1552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020f310 items=0 ppid=1533 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761363034343266616335313937626436356130663062646437363232 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.381000 audit: BPF prog-id=61 op=LOAD Dec 13 14:28:46.381000 audit[1552]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020f358 items=0 ppid=1533 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761363034343266616335313937626436356130663062646437363232 Dec 13 14:28:46.382000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:28:46.382000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.382000 audit: BPF prog-id=62 op=LOAD Dec 13 14:28:46.382000 audit[1552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020f768 items=0 ppid=1533 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761363034343266616335313937626436356130663062646437363232 Dec 13 14:28:46.415674 env[1210]: time="2024-12-13T14:28:46.406463530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8zvvx,Uid:e0b876c8-a2a3-4b6a-ad31-377206faa1f9,Namespace:kube-system,Attempt:0,} returns sandbox id \"0ece5c13cf6e01c2804bf5e52febcc98e7855db7d4e5924433cda0750fee8372\"" Dec 13 14:28:46.415674 env[1210]: time="2024-12-13T14:28:46.409621682Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:28:46.415896 kubelet[1456]: E1213 14:28:46.407904 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:46.426244 env[1210]: time="2024-12-13T14:28:46.426015409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nw754,Uid:da97e087-56c3-43dd-ae06-cf4e17b846d2,Namespace:calico-system,Attempt:0,} returns sandbox id \"7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583\"" Dec 13 14:28:46.427055 kubelet[1456]: E1213 14:28:46.427021 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:46.791832 kubelet[1456]: E1213 14:28:46.791766 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:47.050751 kubelet[1456]: E1213 14:28:47.050128 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:47.792619 kubelet[1456]: E1213 14:28:47.792563 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:47.820887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3035464085.mount: Deactivated successfully. Dec 13 14:28:48.793475 kubelet[1456]: E1213 14:28:48.793440 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:49.050924 kubelet[1456]: E1213 14:28:49.050809 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:49.124504 env[1210]: time="2024-12-13T14:28:49.124446038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:49.187784 env[1210]: time="2024-12-13T14:28:49.187717100Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:49.237939 env[1210]: time="2024-12-13T14:28:49.237875666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:49.291197 env[1210]: time="2024-12-13T14:28:49.291118881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:49.291814 env[1210]: time="2024-12-13T14:28:49.291788615Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:28:49.292708 env[1210]: time="2024-12-13T14:28:49.292676216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:28:49.294155 env[1210]: time="2024-12-13T14:28:49.294101605Z" level=info msg="CreateContainer within sandbox \"0ece5c13cf6e01c2804bf5e52febcc98e7855db7d4e5924433cda0750fee8372\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:28:49.794501 kubelet[1456]: E1213 14:28:49.794431 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:50.361744 env[1210]: time="2024-12-13T14:28:50.361675140Z" level=info msg="CreateContainer within sandbox \"0ece5c13cf6e01c2804bf5e52febcc98e7855db7d4e5924433cda0750fee8372\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7b264d5aa5ff554945a6923e060842ea0dd3764333cb6e82fe25131c4162b701\"" Dec 13 14:28:50.362461 env[1210]: time="2024-12-13T14:28:50.362432868Z" level=info msg="StartContainer for \"7b264d5aa5ff554945a6923e060842ea0dd3764333cb6e82fe25131c4162b701\"" Dec 13 14:28:50.380615 systemd[1]: run-containerd-runc-k8s.io-7b264d5aa5ff554945a6923e060842ea0dd3764333cb6e82fe25131c4162b701-runc.m4mMU8.mount: Deactivated successfully. Dec 13 14:28:50.382067 systemd[1]: Started cri-containerd-7b264d5aa5ff554945a6923e060842ea0dd3764333cb6e82fe25131c4162b701.scope. Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdbd56da688 items=0 ppid=1527 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323634643561613566663535343934356136393233653036303834 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.392000 audit: BPF prog-id=63 op=LOAD Dec 13 14:28:50.392000 audit[1606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022efd8 items=0 ppid=1527 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323634643561613566663535343934356136393233653036303834 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit: BPF prog-id=64 op=LOAD Dec 13 14:28:50.393000 audit[1606]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022f028 items=0 ppid=1527 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323634643561613566663535343934356136393233653036303834 Dec 13 14:28:50.393000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:28:50.393000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { perfmon } for pid=1606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit[1606]: AVC avc: denied { bpf } for pid=1606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:50.393000 audit: BPF prog-id=65 op=LOAD Dec 13 14:28:50.393000 audit[1606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022f0b8 items=0 ppid=1527 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323634643561613566663535343934356136393233653036303834 Dec 13 14:28:50.450000 audit[1658]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.450000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebb3bcb80 a2=0 a3=7ffebb3bcb6c items=0 ppid=1616 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.450000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:28:50.451000 audit[1659]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.451000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd373337f0 a2=0 a3=7ffd373337dc items=0 ppid=1616 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:28:50.452000 audit[1660]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.452000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7db37040 a2=0 a3=7ffc7db3702c items=0 ppid=1616 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:28:50.452000 audit[1661]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.452000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe912fab90 a2=0 a3=7ffe912fab7c items=0 ppid=1616 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:28:50.453000 audit[1662]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.453000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9cac0810 a2=0 a3=7ffc9cac07fc items=0 ppid=1616 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:28:50.453000 audit[1663]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.453000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5a5492c0 a2=0 a3=7ffc5a5492ac items=0 ppid=1616 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:28:50.490354 env[1210]: time="2024-12-13T14:28:50.490268106Z" level=info msg="StartContainer for \"7b264d5aa5ff554945a6923e060842ea0dd3764333cb6e82fe25131c4162b701\" returns successfully" Dec 13 14:28:50.553000 audit[1664]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.553000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe8b9c48d0 a2=0 a3=7ffe8b9c48bc items=0 ppid=1616 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:28:50.555000 audit[1666]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.555000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffffe086990 a2=0 a3=7ffffe08697c items=0 ppid=1616 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:28:50.558000 audit[1669]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.558000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffdad52250 a2=0 a3=7fffdad5223c items=0 ppid=1616 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:28:50.559000 audit[1670]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.559000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc81373510 a2=0 a3=7ffc813734fc items=0 ppid=1616 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:28:50.561000 audit[1672]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.561000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd403a5f90 a2=0 a3=7ffd403a5f7c items=0 ppid=1616 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:28:50.562000 audit[1673]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.562000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0fb20860 a2=0 a3=7ffe0fb2084c items=0 ppid=1616 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:28:50.564000 audit[1675]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.564000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc4ef9570 a2=0 a3=7ffcc4ef955c items=0 ppid=1616 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:28:50.566000 audit[1678]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.566000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffecf307d20 a2=0 a3=7ffecf307d0c items=0 ppid=1616 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:28:50.567000 audit[1679]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.567000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe53b5e480 a2=0 a3=7ffe53b5e46c items=0 ppid=1616 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:28:50.570000 audit[1681]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.570000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfc1ea280 a2=0 a3=7ffcfc1ea26c items=0 ppid=1616 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:28:50.572000 audit[1682]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.572000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb2d4dd00 a2=0 a3=7ffeb2d4dcec items=0 ppid=1616 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:28:50.574000 audit[1684]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.574000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc99e8d230 a2=0 a3=7ffc99e8d21c items=0 ppid=1616 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:50.577000 audit[1687]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.577000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeed124a50 a2=0 a3=7ffeed124a3c items=0 ppid=1616 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:50.580000 audit[1690]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.580000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff4561470 a2=0 a3=7ffff456145c items=0 ppid=1616 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:28:50.581000 audit[1691]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.581000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdff612f20 a2=0 a3=7ffdff612f0c items=0 ppid=1616 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:28:50.582000 audit[1693]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.582000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff1172dc30 a2=0 a3=7fff1172dc1c items=0 ppid=1616 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:50.603000 audit[1698]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.603000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd8dd5190 a2=0 a3=7ffcd8dd517c items=0 ppid=1616 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:50.604000 audit[1699]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.604000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc8e66e90 a2=0 a3=7ffdc8e66e7c items=0 ppid=1616 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:28:50.606000 audit[1701]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:50.606000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc87d82e80 a2=0 a3=7ffc87d82e6c items=0 ppid=1616 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:28:50.623000 audit[1707]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:50.623000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd1d76bae0 a2=0 a3=7ffd1d76bacc items=0 ppid=1616 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:50.657000 audit[1707]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:50.657000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffd1d76bae0 a2=0 a3=7ffd1d76bacc items=0 ppid=1616 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:50.659000 audit[1713]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.659000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdac7514b0 a2=0 a3=7ffdac75149c items=0 ppid=1616 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:28:50.661000 audit[1715]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.661000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc46aa6140 a2=0 a3=7ffc46aa612c items=0 ppid=1616 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:28:50.665000 audit[1718]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.665000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc693ea1c0 a2=0 a3=7ffc693ea1ac items=0 ppid=1616 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:28:50.666000 audit[1719]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.666000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffe5c8d80 a2=0 a3=7ffffe5c8d6c items=0 ppid=1616 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:28:50.669000 audit[1721]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.669000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd26242fd0 a2=0 a3=7ffd26242fbc items=0 ppid=1616 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:28:50.670000 audit[1722]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.670000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef0f595f0 a2=0 a3=7ffef0f595dc items=0 ppid=1616 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:28:50.673000 audit[1724]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.673000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe85fd8a90 a2=0 a3=7ffe85fd8a7c items=0 ppid=1616 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:28:50.676000 audit[1727]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.676000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe4a93a080 a2=0 a3=7ffe4a93a06c items=0 ppid=1616 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:28:50.677000 audit[1728]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.677000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc4c42a90 a2=0 a3=7ffdc4c42a7c items=0 ppid=1616 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:28:50.679000 audit[1730]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.679000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe648a34b0 a2=0 a3=7ffe648a349c items=0 ppid=1616 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:28:50.681000 audit[1731]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.681000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd940eb460 a2=0 a3=7ffd940eb44c items=0 ppid=1616 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:28:50.683000 audit[1733]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.683000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0df8eba0 a2=0 a3=7fff0df8eb8c items=0 ppid=1616 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:50.687000 audit[1736]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.687000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd70144ec0 a2=0 a3=7ffd70144eac items=0 ppid=1616 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:28:50.691000 audit[1739]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.691000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb84173e0 a2=0 a3=7ffcb84173cc items=0 ppid=1616 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:28:50.692000 audit[1740]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.692000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff65606c70 a2=0 a3=7fff65606c5c items=0 ppid=1616 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:28:50.694000 audit[1742]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.694000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe78c4d760 a2=0 a3=7ffe78c4d74c items=0 ppid=1616 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:50.697000 audit[1745]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.697000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe34e25ba0 a2=0 a3=7ffe34e25b8c items=0 ppid=1616 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:50.698000 audit[1746]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.698000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeca883070 a2=0 a3=7ffeca88305c items=0 ppid=1616 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:28:50.700000 audit[1748]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.700000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc8b0c8a20 a2=0 a3=7ffc8b0c8a0c items=0 ppid=1616 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:28:50.702000 audit[1749]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.702000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff16c452a0 a2=0 a3=7fff16c4528c items=0 ppid=1616 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:28:50.704000 audit[1751]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.704000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcca8d6b50 a2=0 a3=7ffcca8d6b3c items=0 ppid=1616 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:50.708000 audit[1754]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:50.708000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcee7d7bc0 a2=0 a3=7ffcee7d7bac items=0 ppid=1616 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:50.710000 audit[1756]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:28:50.710000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffccf709670 a2=0 a3=7ffccf70965c items=0 ppid=1616 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.710000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:50.711000 audit[1756]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:28:50.711000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffccf709670 a2=0 a3=7ffccf70965c items=0 ppid=1616 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:50.711000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:50.795715 kubelet[1456]: E1213 14:28:50.795641 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:51.050516 kubelet[1456]: E1213 14:28:51.050422 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:51.073312 kubelet[1456]: E1213 14:28:51.073283 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:51.165199 kubelet[1456]: E1213 14:28:51.165154 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.165199 kubelet[1456]: W1213 14:28:51.165182 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.165403 kubelet[1456]: E1213 14:28:51.165212 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.165475 kubelet[1456]: E1213 14:28:51.165452 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.165475 kubelet[1456]: W1213 14:28:51.165465 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.165526 kubelet[1456]: E1213 14:28:51.165480 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.165658 kubelet[1456]: E1213 14:28:51.165637 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.165658 kubelet[1456]: W1213 14:28:51.165650 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.165711 kubelet[1456]: E1213 14:28:51.165664 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.165827 kubelet[1456]: E1213 14:28:51.165808 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.165827 kubelet[1456]: W1213 14:28:51.165821 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.165874 kubelet[1456]: E1213 14:28:51.165834 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.166025 kubelet[1456]: E1213 14:28:51.166010 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.166025 kubelet[1456]: W1213 14:28:51.166021 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.166116 kubelet[1456]: E1213 14:28:51.166035 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.166210 kubelet[1456]: E1213 14:28:51.166197 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.166210 kubelet[1456]: W1213 14:28:51.166208 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.166254 kubelet[1456]: E1213 14:28:51.166220 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.166402 kubelet[1456]: E1213 14:28:51.166386 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.166402 kubelet[1456]: W1213 14:28:51.166397 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.166501 kubelet[1456]: E1213 14:28:51.166411 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.166567 kubelet[1456]: E1213 14:28:51.166553 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.166567 kubelet[1456]: W1213 14:28:51.166564 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.166616 kubelet[1456]: E1213 14:28:51.166577 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.166763 kubelet[1456]: E1213 14:28:51.166742 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.166763 kubelet[1456]: W1213 14:28:51.166755 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.166814 kubelet[1456]: E1213 14:28:51.166768 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.166916 kubelet[1456]: E1213 14:28:51.166903 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.166916 kubelet[1456]: W1213 14:28:51.166914 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.166959 kubelet[1456]: E1213 14:28:51.166927 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.167073 kubelet[1456]: E1213 14:28:51.167061 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.167073 kubelet[1456]: W1213 14:28:51.167072 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.167141 kubelet[1456]: E1213 14:28:51.167104 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.167255 kubelet[1456]: E1213 14:28:51.167242 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.167281 kubelet[1456]: W1213 14:28:51.167254 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.167281 kubelet[1456]: E1213 14:28:51.167267 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.167452 kubelet[1456]: E1213 14:28:51.167437 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.167452 kubelet[1456]: W1213 14:28:51.167447 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.167527 kubelet[1456]: E1213 14:28:51.167460 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.167612 kubelet[1456]: E1213 14:28:51.167598 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.167612 kubelet[1456]: W1213 14:28:51.167609 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.167668 kubelet[1456]: E1213 14:28:51.167631 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.167781 kubelet[1456]: E1213 14:28:51.167769 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.167781 kubelet[1456]: W1213 14:28:51.167780 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.167830 kubelet[1456]: E1213 14:28:51.167792 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.167944 kubelet[1456]: E1213 14:28:51.167931 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.167944 kubelet[1456]: W1213 14:28:51.167942 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.167988 kubelet[1456]: E1213 14:28:51.167954 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.168119 kubelet[1456]: E1213 14:28:51.168107 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.168119 kubelet[1456]: W1213 14:28:51.168118 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.168171 kubelet[1456]: E1213 14:28:51.168131 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.168285 kubelet[1456]: E1213 14:28:51.168273 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.168285 kubelet[1456]: W1213 14:28:51.168283 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.168328 kubelet[1456]: E1213 14:28:51.168295 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.168471 kubelet[1456]: E1213 14:28:51.168456 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.168471 kubelet[1456]: W1213 14:28:51.168466 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.168545 kubelet[1456]: E1213 14:28:51.168478 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.168642 kubelet[1456]: E1213 14:28:51.168620 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.168642 kubelet[1456]: W1213 14:28:51.168639 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.168687 kubelet[1456]: E1213 14:28:51.168652 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.172060 kubelet[1456]: E1213 14:28:51.172032 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.172060 kubelet[1456]: W1213 14:28:51.172054 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.172128 kubelet[1456]: E1213 14:28:51.172076 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.172320 kubelet[1456]: E1213 14:28:51.172306 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.172320 kubelet[1456]: W1213 14:28:51.172316 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.172388 kubelet[1456]: E1213 14:28:51.172334 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.172559 kubelet[1456]: E1213 14:28:51.172534 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.172559 kubelet[1456]: W1213 14:28:51.172546 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.172559 kubelet[1456]: E1213 14:28:51.172562 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.172734 kubelet[1456]: E1213 14:28:51.172712 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.172734 kubelet[1456]: W1213 14:28:51.172722 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.172782 kubelet[1456]: E1213 14:28:51.172737 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.172886 kubelet[1456]: E1213 14:28:51.172875 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.172886 kubelet[1456]: W1213 14:28:51.172883 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.172932 kubelet[1456]: E1213 14:28:51.172896 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.173075 kubelet[1456]: E1213 14:28:51.173054 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.173075 kubelet[1456]: W1213 14:28:51.173067 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.173075 kubelet[1456]: E1213 14:28:51.173094 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.173338 kubelet[1456]: E1213 14:28:51.173325 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.173338 kubelet[1456]: W1213 14:28:51.173336 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.173387 kubelet[1456]: E1213 14:28:51.173354 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.173516 kubelet[1456]: E1213 14:28:51.173504 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.173516 kubelet[1456]: W1213 14:28:51.173514 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.173568 kubelet[1456]: E1213 14:28:51.173528 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.173703 kubelet[1456]: E1213 14:28:51.173692 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.173703 kubelet[1456]: W1213 14:28:51.173701 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.173750 kubelet[1456]: E1213 14:28:51.173716 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.173875 kubelet[1456]: E1213 14:28:51.173861 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.173875 kubelet[1456]: W1213 14:28:51.173874 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.173918 kubelet[1456]: E1213 14:28:51.173889 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.174047 kubelet[1456]: E1213 14:28:51.174036 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.174047 kubelet[1456]: W1213 14:28:51.174045 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.174105 kubelet[1456]: E1213 14:28:51.174055 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.174384 kubelet[1456]: E1213 14:28:51.174362 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:51.174384 kubelet[1456]: W1213 14:28:51.174376 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:51.174384 kubelet[1456]: E1213 14:28:51.174386 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:51.219850 kubelet[1456]: I1213 14:28:51.219792 1456 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-8zvvx" podStartSLOduration=5.336557384 podStartE2EDuration="8.21971668s" podCreationTimestamp="2024-12-13 14:28:43 +0000 UTC" firstStartedPulling="2024-12-13 14:28:46.409102935 +0000 UTC m=+3.985441665" lastFinishedPulling="2024-12-13 14:28:49.292262221 +0000 UTC m=+6.868600961" observedRunningTime="2024-12-13 14:28:51.219550505 +0000 UTC m=+8.795889265" watchObservedRunningTime="2024-12-13 14:28:51.21971668 +0000 UTC m=+8.796055420" Dec 13 14:28:51.325797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2073897133.mount: Deactivated successfully. Dec 13 14:28:51.471388 env[1210]: time="2024-12-13T14:28:51.471312590Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:51.473439 env[1210]: time="2024-12-13T14:28:51.473410636Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:51.475476 env[1210]: time="2024-12-13T14:28:51.475422262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:51.477137 env[1210]: time="2024-12-13T14:28:51.477102372Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:51.477646 env[1210]: time="2024-12-13T14:28:51.477606579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:28:51.479234 env[1210]: time="2024-12-13T14:28:51.479182753Z" level=info msg="CreateContainer within sandbox \"7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:28:51.495207 env[1210]: time="2024-12-13T14:28:51.495144189Z" level=info msg="CreateContainer within sandbox \"7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125\"" Dec 13 14:28:51.495745 env[1210]: time="2024-12-13T14:28:51.495718457Z" level=info msg="StartContainer for \"40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125\"" Dec 13 14:28:51.510841 systemd[1]: Started cri-containerd-40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125.scope. Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.523753 kernel: kauditd_printk_skb: 300 callbacks suppressed Dec 13 14:28:51.523798 kernel: audit: type=1400 audit(1734100131.521:492): avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd5516c3ba8 items=0 ppid=1533 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:51.531541 kernel: audit: type=1300 audit(1734100131.521:492): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd5516c3ba8 items=0 ppid=1533 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:51.531591 kernel: audit: type=1327 audit(1734100131.521:492): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363932353437623930653331643233326465656338376263373161 Dec 13 14:28:51.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363932353437623930653331643233326465656338376263373161 Dec 13 14:28:51.535843 kernel: audit: type=1400 audit(1734100131.521:493): avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.538751 kernel: audit: type=1400 audit(1734100131.521:493): avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.542113 kernel: audit: type=1400 audit(1734100131.521:493): avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.548300 kernel: audit: type=1400 audit(1734100131.521:493): avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.548424 kernel: audit: type=1400 audit(1734100131.521:493): avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.554774 kernel: audit: type=1400 audit(1734100131.521:493): avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.558324 kernel: audit: type=1400 audit(1734100131.521:493): avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.521000 audit: BPF prog-id=66 op=LOAD Dec 13 14:28:51.521000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000288db8 items=0 ppid=1533 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:51.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363932353437623930653331643233326465656338376263373161 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.525000 audit: BPF prog-id=67 op=LOAD Dec 13 14:28:51.525000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000288e08 items=0 ppid=1533 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:51.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363932353437623930653331643233326465656338376263373161 Dec 13 14:28:51.534000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:28:51.534000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:51.534000 audit: BPF prog-id=68 op=LOAD Dec 13 14:28:51.534000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000288e98 items=0 ppid=1533 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:51.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363932353437623930653331643233326465656338376263373161 Dec 13 14:28:51.561233 env[1210]: time="2024-12-13T14:28:51.561185699Z" level=info msg="StartContainer for \"40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125\" returns successfully" Dec 13 14:28:51.569805 systemd[1]: cri-containerd-40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125.scope: Deactivated successfully. Dec 13 14:28:51.572000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:28:51.796814 kubelet[1456]: E1213 14:28:51.796757 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:52.076221 kubelet[1456]: E1213 14:28:52.076044 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:52.076221 kubelet[1456]: E1213 14:28:52.076108 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:52.109785 env[1210]: time="2024-12-13T14:28:52.109721830Z" level=info msg="shim disconnected" id=40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125 Dec 13 14:28:52.109785 env[1210]: time="2024-12-13T14:28:52.109783547Z" level=warning msg="cleaning up after shim disconnected" id=40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125 namespace=k8s.io Dec 13 14:28:52.110030 env[1210]: time="2024-12-13T14:28:52.109796087Z" level=info msg="cleaning up dead shim" Dec 13 14:28:52.115402 env[1210]: time="2024-12-13T14:28:52.115361573Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:28:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1835 runtime=io.containerd.runc.v2\n" Dec 13 14:28:52.276322 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-40692547b90e31d232deec87bc71ae9c59f2d97e74b40d3eb6f8f535e4c67125-rootfs.mount: Deactivated successfully. Dec 13 14:28:52.797810 kubelet[1456]: E1213 14:28:52.797750 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:53.050393 kubelet[1456]: E1213 14:28:53.050260 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:53.078168 kubelet[1456]: E1213 14:28:53.078128 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:53.079166 env[1210]: time="2024-12-13T14:28:53.079133130Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:28:53.798538 kubelet[1456]: E1213 14:28:53.798471 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:54.799299 kubelet[1456]: E1213 14:28:54.799249 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:55.052133 kubelet[1456]: E1213 14:28:55.050830 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:55.800167 kubelet[1456]: E1213 14:28:55.800103 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:56.801183 kubelet[1456]: E1213 14:28:56.801110 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:57.050995 kubelet[1456]: E1213 14:28:57.050941 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:57.801517 kubelet[1456]: E1213 14:28:57.801475 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:58.769390 env[1210]: time="2024-12-13T14:28:58.769316946Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.772244 env[1210]: time="2024-12-13T14:28:58.772173985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.774959 env[1210]: time="2024-12-13T14:28:58.774754844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.776413 env[1210]: time="2024-12-13T14:28:58.776381343Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:58.776832 env[1210]: time="2024-12-13T14:28:58.776812031Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:28:58.778412 env[1210]: time="2024-12-13T14:28:58.778372193Z" level=info msg="CreateContainer within sandbox \"7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:28:58.799170 env[1210]: time="2024-12-13T14:28:58.799055164Z" level=info msg="CreateContainer within sandbox \"7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179\"" Dec 13 14:28:58.799859 env[1210]: time="2024-12-13T14:28:58.799836293Z" level=info msg="StartContainer for \"c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179\"" Dec 13 14:28:58.802153 kubelet[1456]: E1213 14:28:58.802107 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:28:58.818818 systemd[1]: Started cri-containerd-c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179.scope. Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.835304 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:28:58.835372 kernel: audit: type=1400 audit(1734100138.833:499): avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fd81ba7cd28 items=0 ppid=1533 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.843536 kernel: audit: type=1300 audit(1734100138.833:499): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fd81ba7cd28 items=0 ppid=1533 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.843624 kernel: audit: type=1327 audit(1734100138.833:499): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353661383031653035616265653330623863323365653038393837 Dec 13 14:28:58.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353661383031653035616265653330623863323365653038393837 Dec 13 14:28:58.848267 kernel: audit: type=1400 audit(1734100138.833:500): avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.851315 kernel: audit: type=1400 audit(1734100138.833:500): avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.854702 kernel: audit: type=1400 audit(1734100138.833:500): avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.857779 kernel: audit: type=1400 audit(1734100138.833:500): avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.864230 kernel: audit: type=1400 audit(1734100138.833:500): avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.864365 kernel: audit: type=1400 audit(1734100138.833:500): avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.870663 kernel: audit: type=1400 audit(1734100138.833:500): avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.833000 audit: BPF prog-id=69 op=LOAD Dec 13 14:28:58.833000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0003a2bf8 items=0 ppid=1533 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353661383031653035616265653330623863323365653038393837 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.837000 audit: BPF prog-id=70 op=LOAD Dec 13 14:28:58.837000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0003a2c48 items=0 ppid=1533 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353661383031653035616265653330623863323365653038393837 Dec 13 14:28:58.847000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:28:58.847000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:58.847000 audit: BPF prog-id=71 op=LOAD Dec 13 14:28:58.847000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0003a2cd8 items=0 ppid=1533 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353661383031653035616265653330623863323365653038393837 Dec 13 14:28:58.874847 env[1210]: time="2024-12-13T14:28:58.874745374Z" level=info msg="StartContainer for \"c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179\" returns successfully" Dec 13 14:28:59.050589 kubelet[1456]: E1213 14:28:59.050453 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:28:59.089491 kubelet[1456]: E1213 14:28:59.089441 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:59.773006 systemd[1]: cri-containerd-c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179.scope: Deactivated successfully. Dec 13 14:28:59.777000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:28:59.790864 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179-rootfs.mount: Deactivated successfully. Dec 13 14:28:59.793597 kubelet[1456]: I1213 14:28:59.793577 1456 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:28:59.802618 kubelet[1456]: E1213 14:28:59.802521 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:00.091788 kubelet[1456]: E1213 14:29:00.091659 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:00.787840 env[1210]: time="2024-12-13T14:29:00.787781058Z" level=info msg="shim disconnected" id=c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179 Dec 13 14:29:00.787840 env[1210]: time="2024-12-13T14:29:00.787830817Z" level=warning msg="cleaning up after shim disconnected" id=c056a801e05abee30b8c23ee0898709ee31cdaf915d68a15a0ab5ebd7315d179 namespace=k8s.io Dec 13 14:29:00.787840 env[1210]: time="2024-12-13T14:29:00.787842036Z" level=info msg="cleaning up dead shim" Dec 13 14:29:00.794506 env[1210]: time="2024-12-13T14:29:00.794448977Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:29:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1901 runtime=io.containerd.runc.v2\n" Dec 13 14:29:00.802768 kubelet[1456]: E1213 14:29:00.802716 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:01.057804 systemd[1]: Created slice kubepods-besteffort-pod87428686_7d73_49c2_b3cb_f621cf2c9a13.slice. Dec 13 14:29:01.062302 env[1210]: time="2024-12-13T14:29:01.062237332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x6c6z,Uid:87428686-7d73-49c2-b3cb-f621cf2c9a13,Namespace:calico-system,Attempt:0,}" Dec 13 14:29:01.080494 kubelet[1456]: I1213 14:29:01.080426 1456 topology_manager.go:215] "Topology Admit Handler" podUID="075fad4f-5c1a-42e6-8a16-a8206a35fa46" podNamespace="default" podName="nginx-deployment-6d5f899847-jr6v7" Dec 13 14:29:01.090345 systemd[1]: Created slice kubepods-besteffort-pod075fad4f_5c1a_42e6_8a16_a8206a35fa46.slice. Dec 13 14:29:01.094597 kubelet[1456]: E1213 14:29:01.094566 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:01.095950 env[1210]: time="2024-12-13T14:29:01.095889124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:29:01.138147 env[1210]: time="2024-12-13T14:29:01.138011669Z" level=error msg="Failed to destroy network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.138566 env[1210]: time="2024-12-13T14:29:01.138525852Z" level=error msg="encountered an error cleaning up failed sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.138624 env[1210]: time="2024-12-13T14:29:01.138586303Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x6c6z,Uid:87428686-7d73-49c2-b3cb-f621cf2c9a13,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.138869 kubelet[1456]: E1213 14:29:01.138836 1456 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.139061 kubelet[1456]: E1213 14:29:01.138910 1456 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x6c6z" Dec 13 14:29:01.139061 kubelet[1456]: E1213 14:29:01.138932 1456 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x6c6z" Dec 13 14:29:01.139061 kubelet[1456]: E1213 14:29:01.138991 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-x6c6z_calico-system(87428686-7d73-49c2-b3cb-f621cf2c9a13)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-x6c6z_calico-system(87428686-7d73-49c2-b3cb-f621cf2c9a13)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:29:01.140059 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515-shm.mount: Deactivated successfully. Dec 13 14:29:01.145687 kubelet[1456]: I1213 14:29:01.145309 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gg2tw\" (UniqueName: \"kubernetes.io/projected/075fad4f-5c1a-42e6-8a16-a8206a35fa46-kube-api-access-gg2tw\") pod \"nginx-deployment-6d5f899847-jr6v7\" (UID: \"075fad4f-5c1a-42e6-8a16-a8206a35fa46\") " pod="default/nginx-deployment-6d5f899847-jr6v7" Dec 13 14:29:01.398245 env[1210]: time="2024-12-13T14:29:01.398133305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jr6v7,Uid:075fad4f-5c1a-42e6-8a16-a8206a35fa46,Namespace:default,Attempt:0,}" Dec 13 14:29:01.462294 env[1210]: time="2024-12-13T14:29:01.462216182Z" level=error msg="Failed to destroy network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.462582 env[1210]: time="2024-12-13T14:29:01.462542593Z" level=error msg="encountered an error cleaning up failed sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.462641 env[1210]: time="2024-12-13T14:29:01.462595206Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jr6v7,Uid:075fad4f-5c1a-42e6-8a16-a8206a35fa46,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.462918 kubelet[1456]: E1213 14:29:01.462878 1456 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.462989 kubelet[1456]: E1213 14:29:01.462954 1456 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-jr6v7" Dec 13 14:29:01.462989 kubelet[1456]: E1213 14:29:01.462980 1456 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-jr6v7" Dec 13 14:29:01.463064 kubelet[1456]: E1213 14:29:01.463052 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-jr6v7_default(075fad4f-5c1a-42e6-8a16-a8206a35fa46)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-jr6v7_default(075fad4f-5c1a-42e6-8a16-a8206a35fa46)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-jr6v7" podUID="075fad4f-5c1a-42e6-8a16-a8206a35fa46" Dec 13 14:29:01.803742 kubelet[1456]: E1213 14:29:01.803659 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:02.081340 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2-shm.mount: Deactivated successfully. Dec 13 14:29:02.098126 kubelet[1456]: I1213 14:29:02.098064 1456 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:02.098912 env[1210]: time="2024-12-13T14:29:02.098866110Z" level=info msg="StopPodSandbox for \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\"" Dec 13 14:29:02.099427 kubelet[1456]: I1213 14:29:02.099380 1456 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:02.100064 env[1210]: time="2024-12-13T14:29:02.100024830Z" level=info msg="StopPodSandbox for \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\"" Dec 13 14:29:02.124580 env[1210]: time="2024-12-13T14:29:02.124500614Z" level=error msg="StopPodSandbox for \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\" failed" error="failed to destroy network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:02.124858 kubelet[1456]: E1213 14:29:02.124831 1456 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:02.124961 kubelet[1456]: E1213 14:29:02.124936 1456 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2"} Dec 13 14:29:02.124993 kubelet[1456]: E1213 14:29:02.124981 1456 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"075fad4f-5c1a-42e6-8a16-a8206a35fa46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:02.125086 kubelet[1456]: E1213 14:29:02.125027 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"075fad4f-5c1a-42e6-8a16-a8206a35fa46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-jr6v7" podUID="075fad4f-5c1a-42e6-8a16-a8206a35fa46" Dec 13 14:29:02.127968 env[1210]: time="2024-12-13T14:29:02.127922442Z" level=error msg="StopPodSandbox for \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\" failed" error="failed to destroy network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:02.128170 kubelet[1456]: E1213 14:29:02.128151 1456 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:02.128170 kubelet[1456]: E1213 14:29:02.128182 1456 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515"} Dec 13 14:29:02.128268 kubelet[1456]: E1213 14:29:02.128218 1456 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"87428686-7d73-49c2-b3cb-f621cf2c9a13\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:02.128268 kubelet[1456]: E1213 14:29:02.128244 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"87428686-7d73-49c2-b3cb-f621cf2c9a13\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x6c6z" podUID="87428686-7d73-49c2-b3cb-f621cf2c9a13" Dec 13 14:29:02.441000 audit[2036]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=2036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.441000 audit[2036]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe18b139d0 a2=0 a3=7ffe18b139bc items=0 ppid=1616 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.449000 audit[2036]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.449000 audit[2036]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe18b139d0 a2=0 a3=0 items=0 ppid=1616 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.467000 audit[2038]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=2038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.467000 audit[2038]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc4ebafdb0 a2=0 a3=7ffc4ebafd9c items=0 ppid=1616 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.480000 audit[2038]: NETFILTER_CFG table=nat:68 family=2 entries=47 op=nft_register_chain pid=2038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:02.480000 audit[2038]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc4ebafdb0 a2=0 a3=7ffc4ebafd9c items=0 ppid=1616 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:02.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:02.789519 kubelet[1456]: E1213 14:29:02.789438 1456 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:02.804617 kubelet[1456]: E1213 14:29:02.804578 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:03.805734 kubelet[1456]: E1213 14:29:03.805682 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:04.806540 kubelet[1456]: E1213 14:29:04.806492 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:05.807008 kubelet[1456]: E1213 14:29:05.806936 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:06.808092 kubelet[1456]: E1213 14:29:06.808002 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:07.809117 kubelet[1456]: E1213 14:29:07.809028 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:08.809856 kubelet[1456]: E1213 14:29:08.809786 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:09.112174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3816076023.mount: Deactivated successfully. Dec 13 14:29:09.811001 kubelet[1456]: E1213 14:29:09.810936 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:09.950278 env[1210]: time="2024-12-13T14:29:09.950202076Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:09.953056 env[1210]: time="2024-12-13T14:29:09.953000690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:09.955369 env[1210]: time="2024-12-13T14:29:09.955307564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:09.956758 env[1210]: time="2024-12-13T14:29:09.956722502Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:09.957268 env[1210]: time="2024-12-13T14:29:09.957227264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:29:09.964723 env[1210]: time="2024-12-13T14:29:09.964673093Z" level=info msg="CreateContainer within sandbox \"7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:29:09.981153 env[1210]: time="2024-12-13T14:29:09.981072742Z" level=info msg="CreateContainer within sandbox \"7a60442fac5197bd65a0f0bdd7622fd25ef8320cbc22e3e0c0401e0c87788583\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b7e21559425816a0e14f75749d848d582fc64c331ed418d206ff705e038c1ac1\"" Dec 13 14:29:09.981777 env[1210]: time="2024-12-13T14:29:09.981724150Z" level=info msg="StartContainer for \"b7e21559425816a0e14f75749d848d582fc64c331ed418d206ff705e038c1ac1\"" Dec 13 14:29:09.997246 systemd[1]: Started cri-containerd-b7e21559425816a0e14f75749d848d582fc64c331ed418d206ff705e038c1ac1.scope. Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.016048 kernel: kauditd_printk_skb: 46 callbacks suppressed Dec 13 14:29:10.016221 kernel: audit: type=1400 audit(1734100150.011:510): avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.016255 kernel: audit: type=1300 audit(1734100150.011:510): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f337c3362c8 items=0 ppid=1533 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:10.011000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f337c3362c8 items=0 ppid=1533 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:10.020678 kernel: audit: type=1327 audit(1734100150.011:510): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653231353539343235383136613065313466373537343964383438 Dec 13 14:29:10.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653231353539343235383136613065313466373537343964383438 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.027740 kernel: audit: type=1400 audit(1734100150.011:511): avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.027791 kernel: audit: type=1400 audit(1734100150.011:511): avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.034190 kernel: audit: type=1400 audit(1734100150.011:511): avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.034348 kernel: audit: type=1400 audit(1734100150.011:511): avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.040717 kernel: audit: type=1400 audit(1734100150.011:511): avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.044303 kernel: audit: type=1400 audit(1734100150.011:511): avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.047594 kernel: audit: type=1400 audit(1734100150.011:511): avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.011000 audit: BPF prog-id=72 op=LOAD Dec 13 14:29:10.011000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000336c78 items=0 ppid=1533 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:10.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653231353539343235383136613065313466373537343964383438 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.014000 audit: BPF prog-id=73 op=LOAD Dec 13 14:29:10.014000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000336cc8 items=0 ppid=1533 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:10.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653231353539343235383136613065313466373537343964383438 Dec 13 14:29:10.019000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:29:10.019000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { perfmon } for pid=2054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit[2054]: AVC avc: denied { bpf } for pid=2054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:10.019000 audit: BPF prog-id=74 op=LOAD Dec 13 14:29:10.019000 audit[2054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000336d58 items=0 ppid=1533 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:10.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653231353539343235383136613065313466373537343964383438 Dec 13 14:29:10.048661 env[1210]: time="2024-12-13T14:29:10.048058378Z" level=info msg="StartContainer for \"b7e21559425816a0e14f75749d848d582fc64c331ed418d206ff705e038c1ac1\" returns successfully" Dec 13 14:29:10.109828 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:29:10.109960 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:29:10.123207 kubelet[1456]: E1213 14:29:10.123166 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:10.811704 kubelet[1456]: E1213 14:29:10.811651 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:11.125170 kubelet[1456]: E1213 14:29:11.125016 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:11.317000 audit[2202]: AVC avc: denied { write } for pid=2202 comm="tee" name="fd" dev="proc" ino=18340 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:11.317000 audit[2202]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe69dc1a29 a2=241 a3=1b6 items=1 ppid=2175 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.317000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:29:11.317000 audit: PATH item=0 name="/dev/fd/63" inode=18337 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:11.317000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:11.319000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=21003 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:11.319000 audit[2193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc978cea2b a2=241 a3=1b6 items=1 ppid=2165 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.319000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:29:11.319000 audit: PATH item=0 name="/dev/fd/63" inode=20996 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:11.319000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:11.333000 audit[2222]: AVC avc: denied { write } for pid=2222 comm="tee" name="fd" dev="proc" ino=18354 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:11.333000 audit[2222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff454e3a19 a2=241 a3=1b6 items=1 ppid=2166 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.333000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:29:11.333000 audit: PATH item=0 name="/dev/fd/63" inode=18349 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:11.333000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:11.333000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=19911 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:11.338000 audit[2220]: AVC avc: denied { write } for pid=2220 comm="tee" name="fd" dev="proc" ino=19038 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:11.338000 audit[2220]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6d665a29 a2=241 a3=1b6 items=1 ppid=2164 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.338000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:29:11.338000 audit: PATH item=0 name="/dev/fd/63" inode=21007 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:11.333000 audit[2226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeabd73a29 a2=241 a3=1b6 items=1 ppid=2178 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.333000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:29:11.333000 audit: PATH item=0 name="/dev/fd/63" inode=19905 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:11.333000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:11.339000 audit[2211]: AVC avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=19042 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:11.339000 audit[2211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc84025a1a a2=241 a3=1b6 items=1 ppid=2170 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.339000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:29:11.339000 audit: PATH item=0 name="/dev/fd/63" inode=18344 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:11.339000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:11.338000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:11.360000 audit[2233]: AVC avc: denied { write } for pid=2233 comm="tee" name="fd" dev="proc" ino=19047 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:11.360000 audit[2233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0b517a2a a2=241 a3=1b6 items=1 ppid=2180 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.360000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:29:11.360000 audit: PATH item=0 name="/dev/fd/63" inode=19908 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:11.360000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit: BPF prog-id=75 op=LOAD Dec 13 14:29:11.619000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdc19ae750 a2=98 a3=3 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.619000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit: BPF prog-id=76 op=LOAD Dec 13 14:29:11.619000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdc19ae530 a2=74 a3=540051 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.619000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.619000 audit: BPF prog-id=77 op=LOAD Dec 13 14:29:11.619000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdc19ae560 a2=94 a3=2 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.619000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.619000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit: BPF prog-id=78 op=LOAD Dec 13 14:29:11.774000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdc19ae420 a2=40 a3=1 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.774000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.774000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:29:11.774000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.774000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdc19ae4f0 a2=50 a3=7ffdc19ae5d0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.774000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc19ae430 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc19ae460 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc19ae370 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc19ae480 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc19ae460 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc19ae450 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc19ae480 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc19ae460 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc19ae480 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdc19ae450 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.785000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.785000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdc19ae4c0 a2=28 a3=0 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdc19ae270 a2=50 a3=1 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit: BPF prog-id=79 op=LOAD Dec 13 14:29:11.786000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdc19ae270 a2=94 a3=5 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.786000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdc19ae320 a2=50 a3=1 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdc19ae440 a2=4 a3=38 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { confidentiality } for pid=2280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:11.786000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdc19ae490 a2=94 a3=6 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.786000 audit[2280]: AVC avc: denied { confidentiality } for pid=2280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:11.786000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdc19adc40 a2=94 a3=83 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.787000 audit[2280]: AVC avc: denied { confidentiality } for pid=2280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:11.787000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdc19adc40 a2=94 a3=83 items=0 ppid=2167 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit: BPF prog-id=80 op=LOAD Dec 13 14:29:11.798000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8620d190 a2=98 a3=1999999999999999 items=0 ppid=2167 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.798000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:11.798000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit: BPF prog-id=81 op=LOAD Dec 13 14:29:11.798000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8620d070 a2=74 a3=ffff items=0 ppid=2167 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.798000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:11.798000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.798000 audit: BPF prog-id=82 op=LOAD Dec 13 14:29:11.798000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8620d0b0 a2=40 a3=7ffe8620d290 items=0 ppid=2167 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.798000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:11.798000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:29:11.812433 kubelet[1456]: E1213 14:29:11.812354 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:11.842614 systemd-networkd[1029]: vxlan.calico: Link UP Dec 13 14:29:11.842623 systemd-networkd[1029]: vxlan.calico: Gained carrier Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit: BPF prog-id=83 op=LOAD Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5e653230 a2=98 a3=ffffffff items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit: BPF prog-id=84 op=LOAD Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5e653040 a2=74 a3=540051 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit: BPF prog-id=85 op=LOAD Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5e653070 a2=94 a3=2 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5e652f40 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5e652f70 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5e652e80 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5e652f90 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5e652f70 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5e652f60 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5e652f90 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5e652f70 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.858000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.858000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5e652f90 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5e652f60 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5e652fd0 a2=28 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit: BPF prog-id=86 op=LOAD Dec 13 14:29:11.859000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5e652e40 a2=40 a3=0 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.859000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd5e652e30 a2=50 a3=2800 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd5e652e30 a2=50 a3=2800 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit: BPF prog-id=87 op=LOAD Dec 13 14:29:11.859000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5e652650 a2=94 a3=2 items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.859000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.859000 audit: BPF prog-id=88 op=LOAD Dec 13 14:29:11.859000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5e652750 a2=94 a3=2d items=0 ppid=2167 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit: BPF prog-id=89 op=LOAD Dec 13 14:29:11.866000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe7960f120 a2=98 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.866000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit: BPF prog-id=90 op=LOAD Dec 13 14:29:11.866000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7960ef00 a2=74 a3=540051 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.866000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.866000 audit: BPF prog-id=91 op=LOAD Dec 13 14:29:11.866000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7960ef30 a2=94 a3=2 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.866000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit: BPF prog-id=92 op=LOAD Dec 13 14:29:11.974000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7960edf0 a2=40 a3=1 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.974000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:29:11.974000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.974000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe7960eec0 a2=50 a3=7ffe7960efa0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7960ee00 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7960ee30 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7960ed40 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7960ee50 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7960ee30 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7960ee20 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7960ee50 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7960ee30 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7960ee50 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7960ee20 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.981000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.981000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7960ee90 a2=28 a3=0 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe7960ec40 a2=50 a3=1 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit: BPF prog-id=93 op=LOAD Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe7960ec40 a2=94 a3=5 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe7960ecf0 a2=50 a3=1 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe7960ee10 a2=4 a3=38 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { confidentiality } for pid=2321 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7960ee60 a2=94 a3=6 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { confidentiality } for pid=2321 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7960e610 a2=94 a3=83 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { confidentiality } for pid=2321 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7960e610 a2=94 a3=83 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.982000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.982000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe79610050 a2=10 a3=208 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.983000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.983000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7960fef0 a2=10 a3=3 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.983000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.983000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.983000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7960fe90 a2=10 a3=3 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.983000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.983000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:11.983000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7960fe90 a2=10 a3=7 items=0 ppid=2167 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:11.983000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:11.992000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:29:12.028000 audit[2342]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:12.028000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffefe33b670 a2=0 a3=7ffefe33b65c items=0 ppid=2167 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.028000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:12.035000 audit[2343]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:12.035000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd51762fc0 a2=0 a3=7ffd51762fac items=0 ppid=2167 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.035000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:12.035000 audit[2344]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:12.035000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe62af3150 a2=0 a3=7ffe62af313c items=0 ppid=2167 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.035000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:12.039000 audit[2345]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:12.039000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff144b28c0 a2=0 a3=7fff144b28ac items=0 ppid=2167 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.039000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:12.812744 kubelet[1456]: E1213 14:29:12.812656 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:13.517000 audit[2356]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.517000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffedc1af050 a2=0 a3=7ffedc1af03c items=0 ppid=1616 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:13.522000 audit[2356]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.522000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffedc1af050 a2=0 a3=7ffedc1af03c items=0 ppid=1616 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:13.725285 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Dec 13 14:29:13.813833 kubelet[1456]: E1213 14:29:13.813691 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:13.813000 audit[2358]: NETFILTER_CFG table=filter:75 family=2 entries=9 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.813000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcb7e0e9f0 a2=0 a3=7ffcb7e0e9dc items=0 ppid=1616 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:13.821000 audit[2358]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:13.821000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcb7e0e9f0 a2=0 a3=7ffcb7e0e9dc items=0 ppid=1616 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:13.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:14.051466 env[1210]: time="2024-12-13T14:29:14.051399910Z" level=info msg="StopPodSandbox for \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\"" Dec 13 14:29:14.089191 kubelet[1456]: I1213 14:29:14.088743 1456 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-nw754" podStartSLOduration=7.558841951 podStartE2EDuration="31.088682702s" podCreationTimestamp="2024-12-13 14:28:43 +0000 UTC" firstStartedPulling="2024-12-13 14:28:46.427701506 +0000 UTC m=+4.004040246" lastFinishedPulling="2024-12-13 14:29:09.957542257 +0000 UTC m=+27.533880997" observedRunningTime="2024-12-13 14:29:10.136690399 +0000 UTC m=+27.713029139" watchObservedRunningTime="2024-12-13 14:29:14.088682702 +0000 UTC m=+31.665021442" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.088 [INFO][2375] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.088 [INFO][2375] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" iface="eth0" netns="/var/run/netns/cni-0a5e61a7-e6ca-e035-cb75-6e0c77be3a1c" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.088 [INFO][2375] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" iface="eth0" netns="/var/run/netns/cni-0a5e61a7-e6ca-e035-cb75-6e0c77be3a1c" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.089 [INFO][2375] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" iface="eth0" netns="/var/run/netns/cni-0a5e61a7-e6ca-e035-cb75-6e0c77be3a1c" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.089 [INFO][2375] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.089 [INFO][2375] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.111 [INFO][2382] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.111 [INFO][2382] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.111 [INFO][2382] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.117 [WARNING][2382] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.117 [INFO][2382] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.118 [INFO][2382] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:14.122214 env[1210]: 2024-12-13 14:29:14.120 [INFO][2375] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:14.122688 env[1210]: time="2024-12-13T14:29:14.122388597Z" level=info msg="TearDown network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\" successfully" Dec 13 14:29:14.122688 env[1210]: time="2024-12-13T14:29:14.122456891Z" level=info msg="StopPodSandbox for \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\" returns successfully" Dec 13 14:29:14.123347 env[1210]: time="2024-12-13T14:29:14.123314047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jr6v7,Uid:075fad4f-5c1a-42e6-8a16-a8206a35fa46,Namespace:default,Attempt:1,}" Dec 13 14:29:14.123807 systemd[1]: run-netns-cni\x2d0a5e61a7\x2de6ca\x2de035\x2dcb75\x2d6e0c77be3a1c.mount: Deactivated successfully. Dec 13 14:29:14.511213 systemd-networkd[1029]: cali2d42f424e96: Link UP Dec 13 14:29:14.514246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:14.514620 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d42f424e96: link becomes ready Dec 13 14:29:14.514430 systemd-networkd[1029]: cali2d42f424e96: Gained carrier Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.417 [INFO][2390] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0 nginx-deployment-6d5f899847- default 075fad4f-5c1a-42e6-8a16-a8206a35fa46 1036 0 2024-12-13 14:29:01 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.122 nginx-deployment-6d5f899847-jr6v7 eth0 default [] [] [kns.default ksa.default.default] cali2d42f424e96 [] []}} ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.417 [INFO][2390] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.443 [INFO][2402] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" HandleID="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.452 [INFO][2402] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" HandleID="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309bf0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.122", "pod":"nginx-deployment-6d5f899847-jr6v7", "timestamp":"2024-12-13 14:29:14.443122394 +0000 UTC"}, Hostname:"10.0.0.122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.452 [INFO][2402] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.452 [INFO][2402] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.452 [INFO][2402] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.122' Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.454 [INFO][2402] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.458 [INFO][2402] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.463 [INFO][2402] ipam/ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.466 [INFO][2402] ipam/ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.468 [INFO][2402] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.468 [INFO][2402] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.470 [INFO][2402] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98 Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.500 [INFO][2402] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.506 [INFO][2402] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.8.129/26] block=192.168.8.128/26 handle="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.506 [INFO][2402] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.129/26] handle="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" host="10.0.0.122" Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.507 [INFO][2402] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:14.549267 env[1210]: 2024-12-13 14:29:14.507 [INFO][2402] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.8.129/26] IPv6=[] ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" HandleID="k8s-pod-network.7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.550151 env[1210]: 2024-12-13 14:29:14.509 [INFO][2390] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"075fad4f-5c1a-42e6-8a16-a8206a35fa46", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"", Pod:"nginx-deployment-6d5f899847-jr6v7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2d42f424e96", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:14.550151 env[1210]: 2024-12-13 14:29:14.509 [INFO][2390] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.8.129/32] ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.550151 env[1210]: 2024-12-13 14:29:14.509 [INFO][2390] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d42f424e96 ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.550151 env[1210]: 2024-12-13 14:29:14.514 [INFO][2390] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.550151 env[1210]: 2024-12-13 14:29:14.514 [INFO][2390] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"075fad4f-5c1a-42e6-8a16-a8206a35fa46", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98", Pod:"nginx-deployment-6d5f899847-jr6v7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2d42f424e96", MAC:"ae:99:a8:48:5c:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:14.550151 env[1210]: 2024-12-13 14:29:14.547 [INFO][2390] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98" Namespace="default" Pod="nginx-deployment-6d5f899847-jr6v7" WorkloadEndpoint="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:14.557000 audit[2426]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:14.557000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffdfb3f36f0 a2=0 a3=7ffdfb3f36dc items=0 ppid=2167 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.557000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:14.566731 env[1210]: time="2024-12-13T14:29:14.566663404Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:14.566731 env[1210]: time="2024-12-13T14:29:14.566698813Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:14.566731 env[1210]: time="2024-12-13T14:29:14.566708654Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:14.566912 env[1210]: time="2024-12-13T14:29:14.566801754Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98 pid=2435 runtime=io.containerd.runc.v2 Dec 13 14:29:14.576820 systemd[1]: Started cri-containerd-7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98.scope. Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.584000 audit: BPF prog-id=94 op=LOAD Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2435 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766316430363064613735343566653836306261613834613237613665 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2435 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766316430363064613735343566653836306261613834613237613665 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit: BPF prog-id=95 op=LOAD Dec 13 14:29:14.585000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000212bf0 items=0 ppid=2435 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766316430363064613735343566653836306261613834613237613665 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit: BPF prog-id=96 op=LOAD Dec 13 14:29:14.585000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000212c38 items=0 ppid=2435 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766316430363064613735343566653836306261613834613237613665 Dec 13 14:29:14.585000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:29:14.585000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.585000 audit: BPF prog-id=97 op=LOAD Dec 13 14:29:14.585000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000213048 items=0 ppid=2435 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766316430363064613735343566653836306261613834613237613665 Dec 13 14:29:14.587698 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:14.607388 env[1210]: time="2024-12-13T14:29:14.607338948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jr6v7,Uid:075fad4f-5c1a-42e6-8a16-a8206a35fa46,Namespace:default,Attempt:1,} returns sandbox id \"7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98\"" Dec 13 14:29:14.608743 env[1210]: time="2024-12-13T14:29:14.608714409Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:29:14.815015 kubelet[1456]: E1213 14:29:14.814874 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:15.816112 kubelet[1456]: E1213 14:29:15.816027 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:15.901284 systemd-networkd[1029]: cali2d42f424e96: Gained IPv6LL Dec 13 14:29:16.094192 update_engine[1203]: I1213 14:29:16.093796 1203 update_attempter.cc:509] Updating boot flags... Dec 13 14:29:16.219399 systemd[1]: run-containerd-runc-k8s.io-b7e21559425816a0e14f75749d848d582fc64c331ed418d206ff705e038c1ac1-runc.64Gtu0.mount: Deactivated successfully. Dec 13 14:29:16.276279 kubelet[1456]: E1213 14:29:16.275802 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:16.816786 kubelet[1456]: E1213 14:29:16.816723 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:17.053267 env[1210]: time="2024-12-13T14:29:17.052877859Z" level=info msg="StopPodSandbox for \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\"" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.176 [INFO][2524] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.176 [INFO][2524] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" iface="eth0" netns="/var/run/netns/cni-d4b6015a-5fb0-c4e9-6812-963138225925" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.177 [INFO][2524] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" iface="eth0" netns="/var/run/netns/cni-d4b6015a-5fb0-c4e9-6812-963138225925" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.177 [INFO][2524] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" iface="eth0" netns="/var/run/netns/cni-d4b6015a-5fb0-c4e9-6812-963138225925" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.177 [INFO][2524] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.177 [INFO][2524] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.204 [INFO][2532] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.204 [INFO][2532] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.204 [INFO][2532] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.210 [WARNING][2532] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.210 [INFO][2532] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.213 [INFO][2532] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:17.216447 env[1210]: 2024-12-13 14:29:17.215 [INFO][2524] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:17.220284 systemd[1]: run-netns-cni\x2dd4b6015a\x2d5fb0\x2dc4e9\x2d6812\x2d963138225925.mount: Deactivated successfully. Dec 13 14:29:17.221393 env[1210]: time="2024-12-13T14:29:17.221344430Z" level=info msg="TearDown network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\" successfully" Dec 13 14:29:17.221393 env[1210]: time="2024-12-13T14:29:17.221386824Z" level=info msg="StopPodSandbox for \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\" returns successfully" Dec 13 14:29:17.222199 env[1210]: time="2024-12-13T14:29:17.222175715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x6c6z,Uid:87428686-7d73-49c2-b3cb-f621cf2c9a13,Namespace:calico-system,Attempt:1,}" Dec 13 14:29:17.486324 systemd-networkd[1029]: calica3a097885e: Link UP Dec 13 14:29:17.490401 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:17.490479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calica3a097885e: link becomes ready Dec 13 14:29:17.490588 systemd-networkd[1029]: calica3a097885e: Gained carrier Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.370 [INFO][2540] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.122-k8s-csi--node--driver--x6c6z-eth0 csi-node-driver- calico-system 87428686-7d73-49c2-b3cb-f621cf2c9a13 1055 0 2024-12-13 14:28:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.122 csi-node-driver-x6c6z eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calica3a097885e [] []}} ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.370 [INFO][2540] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.395 [INFO][2555] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" HandleID="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.403 [INFO][2555] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" HandleID="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309650), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.122", "pod":"csi-node-driver-x6c6z", "timestamp":"2024-12-13 14:29:17.395567595 +0000 UTC"}, Hostname:"10.0.0.122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.403 [INFO][2555] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.403 [INFO][2555] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.403 [INFO][2555] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.122' Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.461 [INFO][2555] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.465 [INFO][2555] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.469 [INFO][2555] ipam/ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.470 [INFO][2555] ipam/ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.472 [INFO][2555] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.472 [INFO][2555] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.474 [INFO][2555] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952 Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.477 [INFO][2555] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.482 [INFO][2555] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.8.130/26] block=192.168.8.128/26 handle="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.482 [INFO][2555] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.130/26] handle="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" host="10.0.0.122" Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.482 [INFO][2555] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:17.500687 env[1210]: 2024-12-13 14:29:17.482 [INFO][2555] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.8.130/26] IPv6=[] ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" HandleID="k8s-pod-network.fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.501539 env[1210]: 2024-12-13 14:29:17.484 [INFO][2540] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-csi--node--driver--x6c6z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"87428686-7d73-49c2-b3cb-f621cf2c9a13", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"", Pod:"csi-node-driver-x6c6z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calica3a097885e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:17.501539 env[1210]: 2024-12-13 14:29:17.484 [INFO][2540] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.8.130/32] ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.501539 env[1210]: 2024-12-13 14:29:17.484 [INFO][2540] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calica3a097885e ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.501539 env[1210]: 2024-12-13 14:29:17.490 [INFO][2540] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.501539 env[1210]: 2024-12-13 14:29:17.491 [INFO][2540] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-csi--node--driver--x6c6z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"87428686-7d73-49c2-b3cb-f621cf2c9a13", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952", Pod:"csi-node-driver-x6c6z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calica3a097885e", MAC:"16:a2:a8:91:d2:65", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:17.501539 env[1210]: 2024-12-13 14:29:17.499 [INFO][2540] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952" Namespace="calico-system" Pod="csi-node-driver-x6c6z" WorkloadEndpoint="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:17.522585 kernel: kauditd_printk_skb: 620 callbacks suppressed Dec 13 14:29:17.522696 kernel: audit: type=1325 audit(1734100157.510:641): table=filter:78 family=2 entries=38 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:17.522733 kernel: audit: type=1300 audit(1734100157.510:641): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd19d634c0 a2=0 a3=7ffd19d634ac items=0 ppid=2167 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:17.510000 audit[2576]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:17.510000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd19d634c0 a2=0 a3=7ffd19d634ac items=0 ppid=2167 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:17.510000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:17.526643 kernel: audit: type=1327 audit(1734100157.510:641): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:17.540972 env[1210]: time="2024-12-13T14:29:17.540891122Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:17.541295 env[1210]: time="2024-12-13T14:29:17.540939869Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:17.541295 env[1210]: time="2024-12-13T14:29:17.540953699Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:17.541295 env[1210]: time="2024-12-13T14:29:17.541145501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952 pid=2584 runtime=io.containerd.runc.v2 Dec 13 14:29:17.564476 systemd[1]: Started cri-containerd-fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952.scope. Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.581309 kernel: audit: type=1400 audit(1734100157.573:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.581373 kernel: audit: type=1400 audit(1734100157.573:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.581396 kernel: audit: type=1400 audit(1734100157.573:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.588333 kernel: audit: type=1400 audit(1734100157.573:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.588405 kernel: audit: type=1400 audit(1734100157.573:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.591290 kernel: audit: type=1400 audit(1734100157.573:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.594648 kernel: audit: type=1400 audit(1734100157.573:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit: BPF prog-id=98 op=LOAD Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2584 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:17.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656231643736303532393466666434333764636632653534623264 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2584 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:17.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656231643736303532393466666434333764636632653534623264 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.580000 audit: BPF prog-id=99 op=LOAD Dec 13 14:29:17.580000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000333ef0 items=0 ppid=2584 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:17.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656231643736303532393466666434333764636632653534623264 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.583000 audit: BPF prog-id=100 op=LOAD Dec 13 14:29:17.583000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000333f38 items=0 ppid=2584 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:17.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656231643736303532393466666434333764636632653534623264 Dec 13 14:29:17.590000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:29:17.590000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:17.590000 audit: BPF prog-id=101 op=LOAD Dec 13 14:29:17.590000 audit[2595]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000374348 items=0 ppid=2584 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:17.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663656231643736303532393466666434333764636632653534623264 Dec 13 14:29:17.599823 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:17.611347 env[1210]: time="2024-12-13T14:29:17.611287648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x6c6z,Uid:87428686-7d73-49c2-b3cb-f621cf2c9a13,Namespace:calico-system,Attempt:1,} returns sandbox id \"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952\"" Dec 13 14:29:17.817547 kubelet[1456]: E1213 14:29:17.817419 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:18.220285 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2707627217.mount: Deactivated successfully. Dec 13 14:29:18.589829 systemd-networkd[1029]: calica3a097885e: Gained IPv6LL Dec 13 14:29:18.817891 kubelet[1456]: E1213 14:29:18.817836 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:19.148045 env[1210]: time="2024-12-13T14:29:19.147996175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:19.150416 env[1210]: time="2024-12-13T14:29:19.150391993Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:19.151966 env[1210]: time="2024-12-13T14:29:19.151942159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:19.153495 env[1210]: time="2024-12-13T14:29:19.153472382Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:19.154003 env[1210]: time="2024-12-13T14:29:19.153980072Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:29:19.154539 env[1210]: time="2024-12-13T14:29:19.154444758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:29:19.158512 env[1210]: time="2024-12-13T14:29:19.158462618Z" level=info msg="CreateContainer within sandbox \"7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:29:19.172177 env[1210]: time="2024-12-13T14:29:19.172129109Z" level=info msg="CreateContainer within sandbox \"7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"e82a71cb621eeb05e069c50700577f7f3db8bb82a7513fccf0e41427a9559f34\"" Dec 13 14:29:19.172684 env[1210]: time="2024-12-13T14:29:19.172664227Z" level=info msg="StartContainer for \"e82a71cb621eeb05e069c50700577f7f3db8bb82a7513fccf0e41427a9559f34\"" Dec 13 14:29:19.185948 systemd[1]: Started cri-containerd-e82a71cb621eeb05e069c50700577f7f3db8bb82a7513fccf0e41427a9559f34.scope. Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit: BPF prog-id=102 op=LOAD Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2435 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:19.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538326137316362363231656562303565303639633530373030353737 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2435 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:19.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538326137316362363231656562303565303639633530373030353737 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit: BPF prog-id=103 op=LOAD Dec 13 14:29:19.193000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020aff0 items=0 ppid=2435 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:19.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538326137316362363231656562303565303639633530373030353737 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit: BPF prog-id=104 op=LOAD Dec 13 14:29:19.193000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020b038 items=0 ppid=2435 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:19.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538326137316362363231656562303565303639633530373030353737 Dec 13 14:29:19.193000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:29:19.193000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { perfmon } for pid=2625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit[2625]: AVC avc: denied { bpf } for pid=2625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:19.193000 audit: BPF prog-id=105 op=LOAD Dec 13 14:29:19.193000 audit[2625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020b448 items=0 ppid=2435 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:19.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538326137316362363231656562303565303639633530373030353737 Dec 13 14:29:19.290802 env[1210]: time="2024-12-13T14:29:19.290744731Z" level=info msg="StartContainer for \"e82a71cb621eeb05e069c50700577f7f3db8bb82a7513fccf0e41427a9559f34\" returns successfully" Dec 13 14:29:19.818936 kubelet[1456]: E1213 14:29:19.818866 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:20.819771 kubelet[1456]: E1213 14:29:20.819702 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:21.012007 env[1210]: time="2024-12-13T14:29:21.011930115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:21.013927 env[1210]: time="2024-12-13T14:29:21.013867409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:21.015704 env[1210]: time="2024-12-13T14:29:21.015661939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:21.017268 env[1210]: time="2024-12-13T14:29:21.017223520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:21.017648 env[1210]: time="2024-12-13T14:29:21.017587809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:29:21.019640 env[1210]: time="2024-12-13T14:29:21.019602158Z" level=info msg="CreateContainer within sandbox \"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:29:21.036034 env[1210]: time="2024-12-13T14:29:21.035967568Z" level=info msg="CreateContainer within sandbox \"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6541966d573ac6baaece5f4b7ade3238ec5ed421d1168617298cc7c016d8ad0e\"" Dec 13 14:29:21.036681 env[1210]: time="2024-12-13T14:29:21.036651682Z" level=info msg="StartContainer for \"6541966d573ac6baaece5f4b7ade3238ec5ed421d1168617298cc7c016d8ad0e\"" Dec 13 14:29:21.059519 systemd[1]: Started cri-containerd-6541966d573ac6baaece5f4b7ade3238ec5ed421d1168617298cc7c016d8ad0e.scope. Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fad181aaa88 items=0 ppid=2584 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:21.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343139363664353733616336626161656365356634623761646533 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.071000 audit: BPF prog-id=106 op=LOAD Dec 13 14:29:21.071000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000389f68 items=0 ppid=2584 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:21.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343139363664353733616336626161656365356634623761646533 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit: BPF prog-id=107 op=LOAD Dec 13 14:29:21.072000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000389fb8 items=0 ppid=2584 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:21.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343139363664353733616336626161656365356634623761646533 Dec 13 14:29:21.072000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:29:21.072000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:21.072000 audit: BPF prog-id=108 op=LOAD Dec 13 14:29:21.072000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d8048 items=0 ppid=2584 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:21.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343139363664353733616336626161656365356634623761646533 Dec 13 14:29:21.134534 env[1210]: time="2024-12-13T14:29:21.134449608Z" level=info msg="StartContainer for \"6541966d573ac6baaece5f4b7ade3238ec5ed421d1168617298cc7c016d8ad0e\" returns successfully" Dec 13 14:29:21.135819 env[1210]: time="2024-12-13T14:29:21.135779332Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:29:21.820953 kubelet[1456]: E1213 14:29:21.820886 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:22.585869 env[1210]: time="2024-12-13T14:29:22.585809291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:22.587786 env[1210]: time="2024-12-13T14:29:22.587750802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:22.589563 env[1210]: time="2024-12-13T14:29:22.589512160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:22.593157 env[1210]: time="2024-12-13T14:29:22.593124404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:22.593660 env[1210]: time="2024-12-13T14:29:22.593619367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:29:22.595352 env[1210]: time="2024-12-13T14:29:22.595312379Z" level=info msg="CreateContainer within sandbox \"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:29:22.611182 env[1210]: time="2024-12-13T14:29:22.611126363Z" level=info msg="CreateContainer within sandbox \"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ae7ddddb9a012ce7ffed1b3099afaa38fa0eebf5224c1a12c7ad19e5780b5f30\"" Dec 13 14:29:22.611822 env[1210]: time="2024-12-13T14:29:22.611775173Z" level=info msg="StartContainer for \"ae7ddddb9a012ce7ffed1b3099afaa38fa0eebf5224c1a12c7ad19e5780b5f30\"" Dec 13 14:29:22.630847 systemd[1]: Started cri-containerd-ae7ddddb9a012ce7ffed1b3099afaa38fa0eebf5224c1a12c7ad19e5780b5f30.scope. Dec 13 14:29:22.644000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645123 kernel: kauditd_printk_skb: 150 callbacks suppressed Dec 13 14:29:22.645184 kernel: audit: type=1400 audit(1734100162.644:684): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.659555 kernel: audit: type=1300 audit(1734100162.644:684): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7efbf95fc6a8 items=0 ppid=2584 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.659687 kernel: audit: type=1327 audit(1734100162.644:684): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165376464646462396130313263653766666564316233303939616661 Dec 13 14:29:22.659715 kernel: audit: type=1400 audit(1734100162.645:685): avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.659733 kernel: audit: type=1400 audit(1734100162.645:685): avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.644000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7efbf95fc6a8 items=0 ppid=2584 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165376464646462396130313263653766666564316233303939616661 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.665965 kernel: audit: type=1400 audit(1734100162.645:685): avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.666006 kernel: audit: type=1400 audit(1734100162.645:685): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.672400 kernel: audit: type=1400 audit(1734100162.645:685): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.672466 kernel: audit: type=1400 audit(1734100162.645:685): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.645000 audit: BPF prog-id=109 op=LOAD Dec 13 14:29:22.645000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00039e548 items=0 ppid=2584 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165376464646462396130313263653766666564316233303939616661 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.652000 audit: BPF prog-id=110 op=LOAD Dec 13 14:29:22.652000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00039e598 items=0 ppid=2584 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165376464646462396130313263653766666564316233303939616661 Dec 13 14:29:22.656000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:29:22.656000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.680092 kernel: audit: type=1400 audit(1734100162.645:685): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:22.656000 audit: BPF prog-id=111 op=LOAD Dec 13 14:29:22.656000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00039e628 items=0 ppid=2584 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:22.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165376464646462396130313263653766666564316233303939616661 Dec 13 14:29:22.681333 env[1210]: time="2024-12-13T14:29:22.681286157Z" level=info msg="StartContainer for \"ae7ddddb9a012ce7ffed1b3099afaa38fa0eebf5224c1a12c7ad19e5780b5f30\" returns successfully" Dec 13 14:29:22.790162 kubelet[1456]: E1213 14:29:22.790107 1456 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:22.821439 kubelet[1456]: E1213 14:29:22.821373 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:23.088524 kubelet[1456]: I1213 14:29:23.088469 1456 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:29:23.088524 kubelet[1456]: I1213 14:29:23.088514 1456 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:29:23.166676 kubelet[1456]: I1213 14:29:23.166602 1456 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-x6c6z" podStartSLOduration=35.185614536 podStartE2EDuration="40.166544353s" podCreationTimestamp="2024-12-13 14:28:43 +0000 UTC" firstStartedPulling="2024-12-13 14:29:17.612921514 +0000 UTC m=+35.189260254" lastFinishedPulling="2024-12-13 14:29:22.593851321 +0000 UTC m=+40.170190071" observedRunningTime="2024-12-13 14:29:23.166421563 +0000 UTC m=+40.742760313" watchObservedRunningTime="2024-12-13 14:29:23.166544353 +0000 UTC m=+40.742883093" Dec 13 14:29:23.166889 kubelet[1456]: I1213 14:29:23.166739 1456 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-jr6v7" podStartSLOduration=17.620895628 podStartE2EDuration="22.166720766s" podCreationTimestamp="2024-12-13 14:29:01 +0000 UTC" firstStartedPulling="2024-12-13 14:29:14.608421601 +0000 UTC m=+32.184760341" lastFinishedPulling="2024-12-13 14:29:19.154246739 +0000 UTC m=+36.730585479" observedRunningTime="2024-12-13 14:29:20.202528888 +0000 UTC m=+37.778867638" watchObservedRunningTime="2024-12-13 14:29:23.166720766 +0000 UTC m=+40.743059506" Dec 13 14:29:23.412000 audit[2760]: NETFILTER_CFG table=filter:79 family=2 entries=8 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:23.412000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdaca28220 a2=0 a3=7ffdaca2820c items=0 ppid=1616 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:23.416000 audit[2760]: NETFILTER_CFG table=nat:80 family=2 entries=34 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:23.416000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdaca28220 a2=0 a3=7ffdaca2820c items=0 ppid=1616 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:23.822245 kubelet[1456]: E1213 14:29:23.822172 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:24.504000 audit[2762]: NETFILTER_CFG table=filter:81 family=2 entries=20 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.504000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff2bb21230 a2=0 a3=7fff2bb2121c items=0 ppid=1616 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.511000 audit[2762]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.511000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff2bb21230 a2=0 a3=0 items=0 ppid=1616 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.525000 audit[2764]: NETFILTER_CFG table=filter:83 family=2 entries=32 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.525000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffea888da80 a2=0 a3=7ffea888da6c items=0 ppid=1616 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.530000 audit[2764]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:24.530000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffea888da80 a2=0 a3=0 items=0 ppid=1616 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:24.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:24.558967 kubelet[1456]: I1213 14:29:24.558900 1456 topology_manager.go:215] "Topology Admit Handler" podUID="c0f61fac-9e9c-4897-a21b-f7c1c3085af7" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:29:24.564041 systemd[1]: Created slice kubepods-besteffort-podc0f61fac_9e9c_4897_a21b_f7c1c3085af7.slice. Dec 13 14:29:24.591882 kubelet[1456]: I1213 14:29:24.591819 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c0f61fac-9e9c-4897-a21b-f7c1c3085af7-data\") pod \"nfs-server-provisioner-0\" (UID: \"c0f61fac-9e9c-4897-a21b-f7c1c3085af7\") " pod="default/nfs-server-provisioner-0" Dec 13 14:29:24.591882 kubelet[1456]: I1213 14:29:24.591882 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9r49d\" (UniqueName: \"kubernetes.io/projected/c0f61fac-9e9c-4897-a21b-f7c1c3085af7-kube-api-access-9r49d\") pod \"nfs-server-provisioner-0\" (UID: \"c0f61fac-9e9c-4897-a21b-f7c1c3085af7\") " pod="default/nfs-server-provisioner-0" Dec 13 14:29:24.823000 kubelet[1456]: E1213 14:29:24.822850 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:24.867831 env[1210]: time="2024-12-13T14:29:24.867769502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c0f61fac-9e9c-4897-a21b-f7c1c3085af7,Namespace:default,Attempt:0,}" Dec 13 14:29:25.142420 systemd-networkd[1029]: cali60e51b789ff: Link UP Dec 13 14:29:25.146756 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:25.146798 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:29:25.147016 systemd-networkd[1029]: cali60e51b789ff: Gained carrier Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.010 [INFO][2767] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.122-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c0f61fac-9e9c-4897-a21b-f7c1c3085af7 1124 0 2024-12-13 14:29:24 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.122 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.010 [INFO][2767] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.039 [INFO][2780] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" HandleID="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Workload="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.052 [INFO][2780] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" HandleID="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Workload="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f4cc0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.122", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:29:25.039746004 +0000 UTC"}, Hostname:"10.0.0.122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.052 [INFO][2780] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.052 [INFO][2780] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.052 [INFO][2780] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.122' Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.054 [INFO][2780] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.061 [INFO][2780] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.070 [INFO][2780] ipam/ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.072 [INFO][2780] ipam/ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.074 [INFO][2780] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.074 [INFO][2780] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.076 [INFO][2780] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292 Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.094 [INFO][2780] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.138 [INFO][2780] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.8.131/26] block=192.168.8.128/26 handle="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.138 [INFO][2780] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.131/26] handle="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" host="10.0.0.122" Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.138 [INFO][2780] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:25.176443 env[1210]: 2024-12-13 14:29:25.138 [INFO][2780] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.8.131/26] IPv6=[] ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" HandleID="k8s-pod-network.f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Workload="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:29:25.177302 env[1210]: 2024-12-13 14:29:25.140 [INFO][2767] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c0f61fac-9e9c-4897-a21b-f7c1c3085af7", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:25.177302 env[1210]: 2024-12-13 14:29:25.140 [INFO][2767] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.8.131/32] ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:29:25.177302 env[1210]: 2024-12-13 14:29:25.140 [INFO][2767] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:29:25.177302 env[1210]: 2024-12-13 14:29:25.147 [INFO][2767] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:29:25.177523 env[1210]: 2024-12-13 14:29:25.147 [INFO][2767] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c0f61fac-9e9c-4897-a21b-f7c1c3085af7", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"c6:c4:e9:c6:31:d8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:25.177523 env[1210]: 2024-12-13 14:29:25.174 [INFO][2767] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.122-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:29:25.186000 audit[2803]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_chain pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:25.186000 audit[2803]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffcdc803e40 a2=0 a3=7ffcdc803e2c items=0 ppid=2167 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.186000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:25.191354 env[1210]: time="2024-12-13T14:29:25.191277881Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:25.191354 env[1210]: time="2024-12-13T14:29:25.191327365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:25.191354 env[1210]: time="2024-12-13T14:29:25.191341795Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:25.191622 env[1210]: time="2024-12-13T14:29:25.191541163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292 pid=2811 runtime=io.containerd.runc.v2 Dec 13 14:29:25.209490 systemd[1]: Started cri-containerd-f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292.scope. Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.221000 audit: BPF prog-id=112 op=LOAD Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2811 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613762646266343338396431623039313361643430313739353938 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2811 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613762646266343338396431623039313361643430313739353938 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit: BPF prog-id=113 op=LOAD Dec 13 14:29:25.222000 audit[2820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020b990 items=0 ppid=2811 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613762646266343338396431623039313361643430313739353938 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit: BPF prog-id=114 op=LOAD Dec 13 14:29:25.222000 audit[2820]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020b9d8 items=0 ppid=2811 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613762646266343338396431623039313361643430313739353938 Dec 13 14:29:25.222000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:29:25.222000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.222000 audit: BPF prog-id=115 op=LOAD Dec 13 14:29:25.222000 audit[2820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020bde8 items=0 ppid=2811 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613762646266343338396431623039313361643430313739353938 Dec 13 14:29:25.224601 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:25.246877 env[1210]: time="2024-12-13T14:29:25.246827003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c0f61fac-9e9c-4897-a21b-f7c1c3085af7,Namespace:default,Attempt:0,} returns sandbox id \"f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292\"" Dec 13 14:29:25.254289 env[1210]: time="2024-12-13T14:29:25.254246477Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:29:25.703137 systemd[1]: run-containerd-runc-k8s.io-f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292-runc.A9RNCb.mount: Deactivated successfully. Dec 13 14:29:25.823745 kubelet[1456]: E1213 14:29:25.823663 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:26.269310 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL Dec 13 14:29:26.824551 kubelet[1456]: E1213 14:29:26.824488 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:27.824906 kubelet[1456]: E1213 14:29:27.824836 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:28.135275 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1991816025.mount: Deactivated successfully. Dec 13 14:29:28.825343 kubelet[1456]: E1213 14:29:28.825218 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:29.825560 kubelet[1456]: E1213 14:29:29.825486 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:30.507562 env[1210]: time="2024-12-13T14:29:30.507494146Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.509413 env[1210]: time="2024-12-13T14:29:30.509361555Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.511330 env[1210]: time="2024-12-13T14:29:30.511298238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.512950 env[1210]: time="2024-12-13T14:29:30.512899690Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.513712 env[1210]: time="2024-12-13T14:29:30.513663612Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:29:30.515670 env[1210]: time="2024-12-13T14:29:30.515644024Z" level=info msg="CreateContainer within sandbox \"f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:29:30.531101 env[1210]: time="2024-12-13T14:29:30.531030401Z" level=info msg="CreateContainer within sandbox \"f3a7bdbf4389d1b0913ad40179598780670e8120cb1df099647799b8403f5292\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"cae9f8a532d1635bf9cb15481ddf04bc1aaad61372a97463698ebaf232f998d8\"" Dec 13 14:29:30.531659 env[1210]: time="2024-12-13T14:29:30.531622037Z" level=info msg="StartContainer for \"cae9f8a532d1635bf9cb15481ddf04bc1aaad61372a97463698ebaf232f998d8\"" Dec 13 14:29:30.550011 systemd[1]: Started cri-containerd-cae9f8a532d1635bf9cb15481ddf04bc1aaad61372a97463698ebaf232f998d8.scope. Dec 13 14:29:30.562170 kernel: kauditd_printk_skb: 111 callbacks suppressed Dec 13 14:29:30.562319 kernel: audit: type=1400 audit(1734100170.558:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.576546 kernel: audit: type=1400 audit(1734100170.558:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.576663 kernel: audit: type=1400 audit(1734100170.558:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.576687 kernel: audit: type=1400 audit(1734100170.558:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.576707 kernel: audit: type=1400 audit(1734100170.558:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.580099 kernel: audit: type=1400 audit(1734100170.558:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.583412 kernel: audit: type=1400 audit(1734100170.558:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.583474 kernel: audit: type=1400 audit(1734100170.558:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.590234 kernel: audit: type=1400 audit(1734100170.558:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.590302 kernel: audit: type=1400 audit(1734100170.562:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.562000 audit: BPF prog-id=116 op=LOAD Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2811 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653966386135333264313633356266396362313534383164646630 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2811 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653966386135333264313633356266396362313534383164646630 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.563000 audit: BPF prog-id=117 op=LOAD Dec 13 14:29:30.563000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000251d10 items=0 ppid=2811 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653966386135333264313633356266396362313534383164646630 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.565000 audit: BPF prog-id=118 op=LOAD Dec 13 14:29:30.565000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000251d58 items=0 ppid=2811 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653966386135333264313633356266396362313534383164646630 Dec 13 14:29:30.572000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:29:30.572000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:30.572000 audit: BPF prog-id=119 op=LOAD Dec 13 14:29:30.572000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c8168 items=0 ppid=2811 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653966386135333264313633356266396362313534383164646630 Dec 13 14:29:30.604757 env[1210]: time="2024-12-13T14:29:30.603205698Z" level=info msg="StartContainer for \"cae9f8a532d1635bf9cb15481ddf04bc1aaad61372a97463698ebaf232f998d8\" returns successfully" Dec 13 14:29:30.640000 audit[2881]: AVC avc: denied { search } for pid=2881 comm="rpcbind" name="crypto" dev="proc" ino=23764 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:29:30.640000 audit[2881]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f96c15930c0 a2=0 a3=0 items=0 ppid=2864 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 key=(null) Dec 13 14:29:30.640000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:29:30.670000 audit[2886]: AVC avc: denied { search } for pid=2886 comm="dbus-daemon" name="crypto" dev="proc" ino=23764 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:29:30.670000 audit[2886]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5f18ec30c0 a2=0 a3=0 items=0 ppid=2864 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 key=(null) Dec 13 14:29:30.670000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:29:30.672000 audit[2887]: AVC avc: denied { watch } for pid=2887 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538660 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c407,c914 tclass=dir permissive=0 Dec 13 14:29:30.672000 audit[2887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55abe386f040 a2=2c8 a3=7ffc49f9178c items=0 ppid=2864 pid=2887 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 key=(null) Dec 13 14:29:30.672000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:29:30.675000 audit[2888]: AVC avc: denied { read } for pid=2888 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23849 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:29:30.675000 audit[2888]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f9705740320 a1=80000 a2=d a3=7ffc091f1e00 items=0 ppid=2864 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 key=(null) Dec 13 14:29:30.675000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:29:30.676000 audit[2888]: AVC avc: denied { search } for pid=2888 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23764 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:29:30.676000 audit[2888]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9704c940c0 a2=0 a3=0 items=0 ppid=2864 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c914 key=(null) Dec 13 14:29:30.676000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:29:30.826349 kubelet[1456]: E1213 14:29:30.826194 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:31.265000 audit[2908]: NETFILTER_CFG table=filter:86 family=2 entries=20 op=nft_register_rule pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:31.265000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd3140ef30 a2=0 a3=7ffd3140ef1c items=0 ppid=1616 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:31.276000 audit[2908]: NETFILTER_CFG table=nat:87 family=2 entries=106 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:31.276000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd3140ef30 a2=0 a3=7ffd3140ef1c items=0 ppid=1616 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:31.827171 kubelet[1456]: E1213 14:29:31.827106 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:32.827809 kubelet[1456]: E1213 14:29:32.827734 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:33.827961 kubelet[1456]: E1213 14:29:33.827892 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:34.828985 kubelet[1456]: E1213 14:29:34.828942 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:35.830198 kubelet[1456]: E1213 14:29:35.830107 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:36.830958 kubelet[1456]: E1213 14:29:36.830861 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:37.831338 kubelet[1456]: E1213 14:29:37.831271 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:38.831535 kubelet[1456]: E1213 14:29:38.831468 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:39.832328 kubelet[1456]: E1213 14:29:39.832270 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:40.286276 kubelet[1456]: I1213 14:29:40.286203 1456 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=11.025869165 podStartE2EDuration="16.286128373s" podCreationTimestamp="2024-12-13 14:29:24 +0000 UTC" firstStartedPulling="2024-12-13 14:29:25.253725424 +0000 UTC m=+42.830064174" lastFinishedPulling="2024-12-13 14:29:30.513984642 +0000 UTC m=+48.090323382" observedRunningTime="2024-12-13 14:29:31.22487643 +0000 UTC m=+48.801215170" watchObservedRunningTime="2024-12-13 14:29:40.286128373 +0000 UTC m=+57.862467113" Dec 13 14:29:40.286601 kubelet[1456]: I1213 14:29:40.286439 1456 topology_manager.go:215] "Topology Admit Handler" podUID="fff46acc-48dc-4c89-a604-ee0c3bdc0ff2" podNamespace="default" podName="test-pod-1" Dec 13 14:29:40.291892 systemd[1]: Created slice kubepods-besteffort-podfff46acc_48dc_4c89_a604_ee0c3bdc0ff2.slice. Dec 13 14:29:40.468698 kubelet[1456]: I1213 14:29:40.468615 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x24tc\" (UniqueName: \"kubernetes.io/projected/fff46acc-48dc-4c89-a604-ee0c3bdc0ff2-kube-api-access-x24tc\") pod \"test-pod-1\" (UID: \"fff46acc-48dc-4c89-a604-ee0c3bdc0ff2\") " pod="default/test-pod-1" Dec 13 14:29:40.468698 kubelet[1456]: I1213 14:29:40.468689 1456 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-726c66c2-9422-4973-bf0f-906eeb7967bb\" (UniqueName: \"kubernetes.io/nfs/fff46acc-48dc-4c89-a604-ee0c3bdc0ff2-pvc-726c66c2-9422-4973-bf0f-906eeb7967bb\") pod \"test-pod-1\" (UID: \"fff46acc-48dc-4c89-a604-ee0c3bdc0ff2\") " pod="default/test-pod-1" Dec 13 14:29:40.579000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.583073 kernel: Failed to create system directory netfs Dec 13 14:29:40.583170 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:29:40.583197 kernel: audit: type=1400 audit(1734100180.579:740): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.583227 kernel: Failed to create system directory netfs Dec 13 14:29:40.583248 kernel: Failed to create system directory netfs Dec 13 14:29:40.584123 kernel: audit: type=1400 audit(1734100180.579:740): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.579000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.588107 kernel: Failed to create system directory netfs Dec 13 14:29:40.579000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.599549 kernel: audit: type=1400 audit(1734100180.579:740): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.599608 kernel: audit: type=1400 audit(1734100180.579:740): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.579000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.579000 audit[2923]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c0f142d5e0 a1=153bc a2=55c0e21402b0 a3=5 items=0 ppid=68 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.579000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:29:40.611761 kernel: audit: type=1300 audit(1734100180.579:740): arch=c000003e syscall=175 success=yes exit=0 a0=55c0f142d5e0 a1=153bc a2=55c0e21402b0 a3=5 items=0 ppid=68 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.611818 kernel: audit: type=1327 audit(1734100180.579:740): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.618230 kernel: Failed to create system directory fscache Dec 13 14:29:40.618271 kernel: audit: type=1400 audit(1734100180.610:741): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.618294 kernel: Failed to create system directory fscache Dec 13 14:29:40.618310 kernel: audit: type=1400 audit(1734100180.610:741): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.623129 kernel: Failed to create system directory fscache Dec 13 14:29:40.623149 kernel: audit: type=1400 audit(1734100180.610:741): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.623168 kernel: Failed to create system directory fscache Dec 13 14:29:40.626968 kernel: audit: type=1400 audit(1734100180.610:741): avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.631864 kernel: Failed to create system directory fscache Dec 13 14:29:40.631882 kernel: Failed to create system directory fscache Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.633417 kernel: Failed to create system directory fscache Dec 13 14:29:40.633451 kernel: Failed to create system directory fscache Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.635753 kernel: Failed to create system directory fscache Dec 13 14:29:40.635785 kernel: Failed to create system directory fscache Dec 13 14:29:40.635809 kernel: Failed to create system directory fscache Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.637281 kernel: Failed to create system directory fscache Dec 13 14:29:40.637304 kernel: Failed to create system directory fscache Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.610000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.638881 kernel: Failed to create system directory fscache Dec 13 14:29:40.641120 kernel: FS-Cache: Loaded Dec 13 14:29:40.610000 audit[2923]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c0f16429c0 a1=4c0fc a2=55c0e21402b0 a3=5 items=0 ppid=68 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.610000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:29:40.671408 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.671550 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.671573 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.673611 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.673661 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.673689 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.674341 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.675826 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.675873 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.676566 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.678783 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.678829 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.678852 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.680308 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.680364 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.681862 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.681919 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.683448 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.683482 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.685810 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.685859 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.685880 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.687245 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.687274 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.688713 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.688747 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.690188 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.690232 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.691953 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.691988 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.693443 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.693473 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.695601 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.695642 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.695663 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.696319 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.697777 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.697824 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.699259 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.699298 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.700738 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.700776 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.702218 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.702252 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.703711 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.703754 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.705236 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.705281 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.706713 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.706747 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.708190 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.708233 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.709688 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.709784 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.711206 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.711252 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.712865 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.713041 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.714339 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.714392 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.715103 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.716768 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.716807 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.718319 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.718383 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.720667 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.720696 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.720711 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.722156 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.722188 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.723724 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.723753 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.725338 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.725380 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.726818 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.727003 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.727540 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.728266 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.729748 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.729783 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.731358 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.731404 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.733681 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.733710 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.733735 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.735170 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.735206 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.736712 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.736763 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.738198 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.738240 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.739744 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.739777 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.740534 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.742804 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.742878 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.742898 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.744291 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.744351 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.745114 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.746679 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.746719 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.748151 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.748183 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.749651 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.749673 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.751149 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.751294 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.752769 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.752827 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.754322 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.754368 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.755144 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.756718 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.756757 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.758301 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.758351 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.759811 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.759853 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.761356 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.761394 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.762825 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.762869 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.764518 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.764564 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.660000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.766128 kernel: Failed to create system directory sunrpc Dec 13 14:29:40.777686 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:29:40.777778 kernel: RPC: Registered udp transport module. Dec 13 14:29:40.777801 kernel: RPC: Registered tcp transport module. Dec 13 14:29:40.777816 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:29:40.660000 audit[2923]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c0f168ead0 a1=1a7f1c a2=55c0e21402b0 a3=5 items=6 ppid=68 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.660000 audit: CWD cwd="/" Dec 13 14:29:40.660000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:40.660000 audit: PATH item=1 name=(null) inode=22271 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:40.660000 audit: PATH item=2 name=(null) inode=22271 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:40.660000 audit: PATH item=3 name=(null) inode=22272 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:40.660000 audit: PATH item=4 name=(null) inode=22271 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:40.660000 audit: PATH item=5 name=(null) inode=22273 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:40.660000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.819542 kernel: Failed to create system directory nfs Dec 13 14:29:40.819787 kernel: Failed to create system directory nfs Dec 13 14:29:40.819811 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.821212 kernel: Failed to create system directory nfs Dec 13 14:29:40.821255 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.822913 kernel: Failed to create system directory nfs Dec 13 14:29:40.822952 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.823779 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.825486 kernel: Failed to create system directory nfs Dec 13 14:29:40.825512 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.827220 kernel: Failed to create system directory nfs Dec 13 14:29:40.827252 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.828901 kernel: Failed to create system directory nfs Dec 13 14:29:40.828938 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.830615 kernel: Failed to create system directory nfs Dec 13 14:29:40.830650 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.832332 kernel: Failed to create system directory nfs Dec 13 14:29:40.832372 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.832454 kubelet[1456]: E1213 14:29:40.832414 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.834261 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.835448 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.836638 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.838026 kernel: Failed to create system directory nfs Dec 13 14:29:40.838071 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.840762 kernel: Failed to create system directory nfs Dec 13 14:29:40.840818 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.842482 kernel: Failed to create system directory nfs Dec 13 14:29:40.842514 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.844204 kernel: Failed to create system directory nfs Dec 13 14:29:40.844237 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.845907 kernel: Failed to create system directory nfs Dec 13 14:29:40.845926 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.847644 kernel: Failed to create system directory nfs Dec 13 14:29:40.847685 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.849373 kernel: Failed to create system directory nfs Dec 13 14:29:40.849421 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.850228 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.851935 kernel: Failed to create system directory nfs Dec 13 14:29:40.851968 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.853648 kernel: Failed to create system directory nfs Dec 13 14:29:40.853677 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.855391 kernel: Failed to create system directory nfs Dec 13 14:29:40.855414 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.857112 kernel: Failed to create system directory nfs Dec 13 14:29:40.857145 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.858813 kernel: Failed to create system directory nfs Dec 13 14:29:40.858849 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.860531 kernel: Failed to create system directory nfs Dec 13 14:29:40.860572 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.862287 kernel: Failed to create system directory nfs Dec 13 14:29:40.862335 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.864759 kernel: Failed to create system directory nfs Dec 13 14:29:40.864790 kernel: Failed to create system directory nfs Dec 13 14:29:40.864818 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.865471 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.866160 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.867546 kernel: Failed to create system directory nfs Dec 13 14:29:40.867587 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.869794 kernel: Failed to create system directory nfs Dec 13 14:29:40.869819 kernel: Failed to create system directory nfs Dec 13 14:29:40.869842 kernel: Failed to create system directory nfs Dec 13 14:29:40.809000 audit[2923]: AVC avc: denied { confidentiality } for pid=2923 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.892119 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:29:40.809000 audit[2923]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c0f18af700 a1=16e97c a2=55c0e21402b0 a3=5 items=0 ppid=68 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.809000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.935682 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.935855 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.935883 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.937514 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.937573 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.938909 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.938968 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.940695 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.940739 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.942452 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.942495 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.944272 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.944318 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.946898 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.946950 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.946972 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.948674 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.948698 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.950456 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.950480 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.951375 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.953149 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.953346 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.954860 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.954901 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.956615 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.956654 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.958337 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.958386 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.960958 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.961011 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.961031 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.962789 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.962830 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.964557 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.964593 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.966339 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.966402 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.967169 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.968767 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.968805 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.969597 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.971194 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.971233 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.972832 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.972879 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.974431 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.974465 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.976868 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.976913 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.976945 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.978503 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.978535 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.980197 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.980240 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.981839 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.981871 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.983539 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.983567 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.984340 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.986788 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.986823 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.986840 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.988437 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.988471 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.990839 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.990884 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.990906 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.991646 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.992501 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.993330 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.994127 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.995756 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.995795 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.997425 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.997454 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.999914 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.999952 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.999971 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.001742 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.001767 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.003452 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.003494 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.005170 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.005196 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.006861 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.006886 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.007758 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.009524 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.009564 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.011268 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.011305 kernel: Failed to create system directory nfs4 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:40.921000 audit[2928]: AVC avc: denied { confidentiality } for pid=2928 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.013883 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.013916 kernel: Failed to create system directory nfs4 Dec 13 14:29:41.216599 kernel: NFS: Registering the id_resolver key type Dec 13 14:29:41.216744 kernel: Key type id_resolver registered Dec 13 14:29:41.216765 kernel: Key type id_legacy registered Dec 13 14:29:40.921000 audit[2928]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe5b8e00010 a1=208de4 a2=55f3b5b352b0 a3=5 items=0 ppid=68 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:40.921000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.236216 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.236258 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.236274 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.238952 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.238988 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.239035 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.240799 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.240835 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.242610 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.242652 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.244490 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.244622 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.246269 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.246347 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.248825 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.248868 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.248884 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.250677 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.250725 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.252467 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.252511 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.254241 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.254274 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.256957 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.256989 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.257010 kernel: Failed to create system directory rpcgss Dec 13 14:29:41.231000 audit[2929]: AVC avc: denied { confidentiality } for pid=2929 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:41.231000 audit[2929]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2232c19010 a1=70af4 a2=559f184eb2b0 a3=5 items=0 ppid=68 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.231000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:29:41.298012 nfsidmap[2937]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:29:41.300784 nfsidmap[2940]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:29:41.306000 audit[1276]: AVC avc: denied { watch_reads } for pid=1276 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:29:41.306000 audit[1276]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562a7a595a90 a2=10 a3=2a05f15a2d868430 items=0 ppid=1 pid=1276 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.306000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:29:41.306000 audit[1276]: AVC avc: denied { watch_reads } for pid=1276 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:29:41.306000 audit[1276]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562a7a595a90 a2=10 a3=2a05f15a2d868430 items=0 ppid=1 pid=1276 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.306000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:29:41.306000 audit[1276]: AVC avc: denied { watch_reads } for pid=1276 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:29:41.306000 audit[1276]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=562a7a595a90 a2=10 a3=2a05f15a2d868430 items=0 ppid=1 pid=1276 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.306000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:29:41.306000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:29:41.306000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:29:41.306000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:29:41.495426 env[1210]: time="2024-12-13T14:29:41.495229358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fff46acc-48dc-4c89-a604-ee0c3bdc0ff2,Namespace:default,Attempt:0,}" Dec 13 14:29:41.833338 kubelet[1456]: E1213 14:29:41.833200 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:41.919345 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP Dec 13 14:29:41.923326 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:41.923364 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:29:41.923136 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.822 [INFO][2944] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.122-k8s-test--pod--1-eth0 default fff46acc-48dc-4c89-a604-ee0c3bdc0ff2 1191 0 2024-12-13 14:29:24 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.122 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.822 [INFO][2944] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-eth0" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.856 [INFO][2958] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" HandleID="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Workload="10.0.0.122-k8s-test--pod--1-eth0" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.867 [INFO][2958] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" HandleID="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Workload="10.0.0.122-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005034c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.122", "pod":"test-pod-1", "timestamp":"2024-12-13 14:29:41.856723928 +0000 UTC"}, Hostname:"10.0.0.122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.867 [INFO][2958] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.867 [INFO][2958] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.867 [INFO][2958] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.122' Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.868 [INFO][2958] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.872 [INFO][2958] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.876 [INFO][2958] ipam/ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.877 [INFO][2958] ipam/ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.879 [INFO][2958] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.879 [INFO][2958] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.880 [INFO][2958] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.897 [INFO][2958] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.915 [INFO][2958] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.8.132/26] block=192.168.8.128/26 handle="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.915 [INFO][2958] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.132/26] handle="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" host="10.0.0.122" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.915 [INFO][2958] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.915 [INFO][2958] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.8.132/26] IPv6=[] ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" HandleID="k8s-pod-network.d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Workload="10.0.0.122-k8s-test--pod--1-eth0" Dec 13 14:29:41.932638 env[1210]: 2024-12-13 14:29:41.917 [INFO][2944] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fff46acc-48dc-4c89-a604-ee0c3bdc0ff2", ResourceVersion:"1191", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:41.933554 env[1210]: 2024-12-13 14:29:41.917 [INFO][2944] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.8.132/32] ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-eth0" Dec 13 14:29:41.933554 env[1210]: 2024-12-13 14:29:41.917 [INFO][2944] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-eth0" Dec 13 14:29:41.933554 env[1210]: 2024-12-13 14:29:41.923 [INFO][2944] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-eth0" Dec 13 14:29:41.933554 env[1210]: 2024-12-13 14:29:41.924 [INFO][2944] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fff46acc-48dc-4c89-a604-ee0c3bdc0ff2", ResourceVersion:"1191", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0a:ae:3e:4c:ca:92", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:41.933554 env[1210]: 2024-12-13 14:29:41.931 [INFO][2944] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.122-k8s-test--pod--1-eth0" Dec 13 14:29:41.943569 env[1210]: time="2024-12-13T14:29:41.943444242Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:41.943739 env[1210]: time="2024-12-13T14:29:41.943540244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:41.943739 env[1210]: time="2024-12-13T14:29:41.943556216Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:41.943739 env[1210]: time="2024-12-13T14:29:41.943699242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b pid=2986 runtime=io.containerd.runc.v2 Dec 13 14:29:41.943000 audit[2987]: NETFILTER_CFG table=filter:88 family=2 entries=38 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:41.943000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffc1a19dd00 a2=0 a3=7ffc1a19dcec items=0 ppid=2167 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.943000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:41.963874 systemd[1]: run-containerd-runc-k8s.io-d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b-runc.zmgcyo.mount: Deactivated successfully. Dec 13 14:29:41.966137 systemd[1]: Started cri-containerd-d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b.scope. Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.975000 audit: BPF prog-id=120 op=LOAD Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2986 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832623534643162303566386366326165653131373564363664 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2986 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832623534643162303566386366326165653131373564363664 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit: BPF prog-id=121 op=LOAD Dec 13 14:29:41.976000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000269ce0 items=0 ppid=2986 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832623534643162303566386366326165653131373564363664 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit: BPF prog-id=122 op=LOAD Dec 13 14:29:41.976000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000269d28 items=0 ppid=2986 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832623534643162303566386366326165653131373564363664 Dec 13 14:29:41.976000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:29:41.976000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:41.976000 audit: BPF prog-id=123 op=LOAD Dec 13 14:29:41.976000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ec138 items=0 ppid=2986 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:41.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832623534643162303566386366326165653131373564363664 Dec 13 14:29:41.978505 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:41.999941 env[1210]: time="2024-12-13T14:29:41.999889447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fff46acc-48dc-4c89-a604-ee0c3bdc0ff2,Namespace:default,Attempt:0,} returns sandbox id \"d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b\"" Dec 13 14:29:42.001842 env[1210]: time="2024-12-13T14:29:42.001810993Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:29:42.400401 env[1210]: time="2024-12-13T14:29:42.400327049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:42.403012 env[1210]: time="2024-12-13T14:29:42.402970424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:42.405018 env[1210]: time="2024-12-13T14:29:42.404979421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:42.407204 env[1210]: time="2024-12-13T14:29:42.407158187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:42.407829 env[1210]: time="2024-12-13T14:29:42.407794389Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:29:42.410058 env[1210]: time="2024-12-13T14:29:42.410017514Z" level=info msg="CreateContainer within sandbox \"d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:29:42.429109 env[1210]: time="2024-12-13T14:29:42.429026870Z" level=info msg="CreateContainer within sandbox \"d0c82b54d1b05f8cf2aee1175d66df4094b567d623767c0e3be59c8c44d2d11b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"ba10b79930292469b31ca19d1e4a101319f06284fe14e53d11b7ac95d5ae549b\"" Dec 13 14:29:42.430157 env[1210]: time="2024-12-13T14:29:42.430105777Z" level=info msg="StartContainer for \"ba10b79930292469b31ca19d1e4a101319f06284fe14e53d11b7ac95d5ae549b\"" Dec 13 14:29:42.446850 systemd[1]: Started cri-containerd-ba10b79930292469b31ca19d1e4a101319f06284fe14e53d11b7ac95d5ae549b.scope. Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.456000 audit: BPF prog-id=124 op=LOAD Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2986 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:42.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313062373939333032393234363962333163613139643165346131 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2986 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:42.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313062373939333032393234363962333163613139643165346131 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit: BPF prog-id=125 op=LOAD Dec 13 14:29:42.457000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020d130 items=0 ppid=2986 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:42.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313062373939333032393234363962333163613139643165346131 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit: BPF prog-id=126 op=LOAD Dec 13 14:29:42.457000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020d178 items=0 ppid=2986 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:42.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313062373939333032393234363962333163613139643165346131 Dec 13 14:29:42.457000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:29:42.457000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { perfmon } for pid=3029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit[3029]: AVC avc: denied { bpf } for pid=3029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:42.457000 audit: BPF prog-id=127 op=LOAD Dec 13 14:29:42.457000 audit[3029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020d588 items=0 ppid=2986 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:42.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261313062373939333032393234363962333163613139643165346131 Dec 13 14:29:42.470045 env[1210]: time="2024-12-13T14:29:42.469985249Z" level=info msg="StartContainer for \"ba10b79930292469b31ca19d1e4a101319f06284fe14e53d11b7ac95d5ae549b\" returns successfully" Dec 13 14:29:42.790012 kubelet[1456]: E1213 14:29:42.789945 1456 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:42.818337 env[1210]: time="2024-12-13T14:29:42.818291889Z" level=info msg="StopPodSandbox for \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\"" Dec 13 14:29:42.833502 kubelet[1456]: E1213 14:29:42.833455 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.852 [WARNING][3092] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-csi--node--driver--x6c6z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"87428686-7d73-49c2-b3cb-f621cf2c9a13", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952", Pod:"csi-node-driver-x6c6z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calica3a097885e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.852 [INFO][3092] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.852 [INFO][3092] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" iface="eth0" netns="" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.852 [INFO][3092] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.852 [INFO][3092] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.870 [INFO][3099] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.870 [INFO][3099] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.870 [INFO][3099] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.875 [WARNING][3099] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.876 [INFO][3099] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.877 [INFO][3099] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:42.879458 env[1210]: 2024-12-13 14:29:42.878 [INFO][3092] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.880024 env[1210]: time="2024-12-13T14:29:42.879486387Z" level=info msg="TearDown network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\" successfully" Dec 13 14:29:42.880024 env[1210]: time="2024-12-13T14:29:42.879522359Z" level=info msg="StopPodSandbox for \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\" returns successfully" Dec 13 14:29:42.880425 env[1210]: time="2024-12-13T14:29:42.880377618Z" level=info msg="RemovePodSandbox for \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\"" Dec 13 14:29:42.880482 env[1210]: time="2024-12-13T14:29:42.880426977Z" level=info msg="Forcibly stopping sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\"" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.915 [WARNING][3122] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-csi--node--driver--x6c6z-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"87428686-7d73-49c2-b3cb-f621cf2c9a13", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"fceb1d7605294ffd437dcf2e54b2dccb8727000447bc1dff7c26215807f21952", Pod:"csi-node-driver-x6c6z", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calica3a097885e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.916 [INFO][3122] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.916 [INFO][3122] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" iface="eth0" netns="" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.916 [INFO][3122] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.916 [INFO][3122] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.935 [INFO][3129] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.935 [INFO][3129] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.936 [INFO][3129] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.941 [WARNING][3129] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.941 [INFO][3129] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" HandleID="k8s-pod-network.a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Workload="10.0.0.122-k8s-csi--node--driver--x6c6z-eth0" Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.942 [INFO][3129] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:42.944825 env[1210]: 2024-12-13 14:29:42.943 [INFO][3122] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515" Dec 13 14:29:42.945613 env[1210]: time="2024-12-13T14:29:42.944839760Z" level=info msg="TearDown network for sandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\" successfully" Dec 13 14:29:42.950267 env[1210]: time="2024-12-13T14:29:42.950212802Z" level=info msg="RemovePodSandbox \"a2c7dc1c9f71f04e71b7930f50bacff5489cecbcae39bea8add6ddedc898f515\" returns successfully" Dec 13 14:29:42.951022 env[1210]: time="2024-12-13T14:29:42.950971600Z" level=info msg="StopPodSandbox for \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\"" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:42.984 [WARNING][3151] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"075fad4f-5c1a-42e6-8a16-a8206a35fa46", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98", Pod:"nginx-deployment-6d5f899847-jr6v7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2d42f424e96", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:42.984 [INFO][3151] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:42.984 [INFO][3151] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" iface="eth0" netns="" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:42.984 [INFO][3151] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:42.984 [INFO][3151] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:43.016 [INFO][3158] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:43.016 [INFO][3158] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:43.016 [INFO][3158] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:43.021 [WARNING][3158] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:43.021 [INFO][3158] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:43.023 [INFO][3158] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:43.025440 env[1210]: 2024-12-13 14:29:43.024 [INFO][3151] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.025932 env[1210]: time="2024-12-13T14:29:43.025456505Z" level=info msg="TearDown network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\" successfully" Dec 13 14:29:43.025932 env[1210]: time="2024-12-13T14:29:43.025536093Z" level=info msg="StopPodSandbox for \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\" returns successfully" Dec 13 14:29:43.026134 env[1210]: time="2024-12-13T14:29:43.026099167Z" level=info msg="RemovePodSandbox for \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\"" Dec 13 14:29:43.026307 env[1210]: time="2024-12-13T14:29:43.026131501Z" level=info msg="Forcibly stopping sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\"" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.057 [WARNING][3181] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"075fad4f-5c1a-42e6-8a16-a8206a35fa46", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 29, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.122", ContainerID:"7f1d060da7545fe860baa84a27a6eef4ea42b2db3a7c173f0520c3db6fd70e98", Pod:"nginx-deployment-6d5f899847-jr6v7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2d42f424e96", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.057 [INFO][3181] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.057 [INFO][3181] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" iface="eth0" netns="" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.057 [INFO][3181] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.057 [INFO][3181] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.090 [INFO][3190] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.091 [INFO][3190] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.091 [INFO][3190] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.096 [WARNING][3190] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.096 [INFO][3190] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" HandleID="k8s-pod-network.be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Workload="10.0.0.122-k8s-nginx--deployment--6d5f899847--jr6v7-eth0" Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.098 [INFO][3190] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:43.100833 env[1210]: 2024-12-13 14:29:43.099 [INFO][3181] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2" Dec 13 14:29:43.100833 env[1210]: time="2024-12-13T14:29:43.100798178Z" level=info msg="TearDown network for sandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\" successfully" Dec 13 14:29:43.155472 env[1210]: time="2024-12-13T14:29:43.155397485Z" level=info msg="RemovePodSandbox \"be6e93c3e7dd6baf7c3fc536b288429c27c1f5df5ab75785cb3a90dc5f68a6e2\" returns successfully" Dec 13 14:29:43.294331 kubelet[1456]: I1213 14:29:43.294269 1456 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.887464485 podStartE2EDuration="19.294220856s" podCreationTimestamp="2024-12-13 14:29:24 +0000 UTC" firstStartedPulling="2024-12-13 14:29:42.001384009 +0000 UTC m=+59.577722750" lastFinishedPulling="2024-12-13 14:29:42.408140381 +0000 UTC m=+59.984479121" observedRunningTime="2024-12-13 14:29:43.293957441 +0000 UTC m=+60.870296181" watchObservedRunningTime="2024-12-13 14:29:43.294220856 +0000 UTC m=+60.870559596" Dec 13 14:29:43.805324 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:29:43.834562 kubelet[1456]: E1213 14:29:43.834499 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:44.835175 kubelet[1456]: E1213 14:29:44.835113 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:45.835912 kubelet[1456]: E1213 14:29:45.835828 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:46.836806 kubelet[1456]: E1213 14:29:46.836741 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:29:47.837621 kubelet[1456]: E1213 14:29:47.837570 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"