Dec 13 14:30:30.842772 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:30:30.842791 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:30.842800 kernel: BIOS-provided physical RAM map: Dec 13 14:30:30.842805 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:30:30.842811 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:30:30.842816 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:30:30.842823 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:30:30.842829 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:30:30.842834 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:30:30.842841 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:30:30.842847 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 14:30:30.842852 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:30:30.842858 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:30:30.842864 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:30:30.842871 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:30:30.842878 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:30:30.842884 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:30:30.842890 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:30:30.842895 kernel: NX (Execute Disable) protection: active Dec 13 14:30:30.842901 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:30:30.842907 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:30:30.842913 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:30:30.842919 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:30:30.842925 kernel: extended physical RAM map: Dec 13 14:30:30.842931 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:30:30.842938 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:30:30.842944 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:30:30.842950 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:30:30.842956 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:30:30.842962 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:30:30.842968 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:30:30.842974 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 14:30:30.842980 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 14:30:30.842986 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 14:30:30.842991 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 14:30:30.842997 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 14:30:30.843004 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:30:30.843010 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:30:30.843016 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:30:30.843022 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:30:30.843031 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:30:30.843037 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:30:30.843043 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:30:30.843051 kernel: efi: EFI v2.70 by EDK II Dec 13 14:30:30.843057 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 14:30:30.843064 kernel: random: crng init done Dec 13 14:30:30.843070 kernel: SMBIOS 2.8 present. Dec 13 14:30:30.843077 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 14:30:30.843083 kernel: Hypervisor detected: KVM Dec 13 14:30:30.843089 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:30:30.843096 kernel: kvm-clock: cpu 0, msr 5e19a001, primary cpu clock Dec 13 14:30:30.843102 kernel: kvm-clock: using sched offset of 4046436234 cycles Dec 13 14:30:30.843110 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:30:30.843117 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:30:30.843124 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:30:30.843130 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:30:30.843137 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 14:30:30.843144 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:30:30.843150 kernel: Using GB pages for direct mapping Dec 13 14:30:30.843157 kernel: Secure boot disabled Dec 13 14:30:30.843163 kernel: ACPI: Early table checksum verification disabled Dec 13 14:30:30.843171 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 14:30:30.843177 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 14:30:30.843184 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:30.843190 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:30.843197 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 14:30:30.843203 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:30.843210 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:30.843216 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:30.843223 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:30.843230 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 14:30:30.843237 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 14:30:30.843251 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 14:30:30.843257 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 14:30:30.843264 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 14:30:30.843271 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 14:30:30.843277 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 14:30:30.843283 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 14:30:30.843290 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 14:30:30.843298 kernel: No NUMA configuration found Dec 13 14:30:30.843304 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 14:30:30.843311 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 14:30:30.843317 kernel: Zone ranges: Dec 13 14:30:30.843324 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:30:30.843330 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 14:30:30.843336 kernel: Normal empty Dec 13 14:30:30.843343 kernel: Movable zone start for each node Dec 13 14:30:30.843349 kernel: Early memory node ranges Dec 13 14:30:30.843357 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:30:30.843364 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 14:30:30.843370 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 14:30:30.843377 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 14:30:30.843383 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 14:30:30.843390 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 14:30:30.843396 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 14:30:30.843403 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:30:30.843409 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:30:30.843415 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 14:30:30.843423 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:30:30.843429 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 14:30:30.843436 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 14:30:30.843443 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 14:30:30.843449 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:30:30.843456 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:30:30.843462 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:30:30.843469 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:30:30.843476 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:30:30.843483 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:30:30.843489 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:30:30.843496 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:30:30.843502 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:30:30.843521 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:30:30.843527 kernel: TSC deadline timer available Dec 13 14:30:30.843534 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:30:30.843540 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:30:30.843547 kernel: kvm-guest: setup PV sched yield Dec 13 14:30:30.843555 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:30:30.843562 kernel: Booting paravirtualized kernel on KVM Dec 13 14:30:30.843573 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:30:30.843581 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:30:30.843588 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:30:30.843595 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:30:30.843602 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:30:30.843608 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:30:30.843615 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 14:30:30.843622 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:30:30.843628 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:30:30.843635 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 14:30:30.843643 kernel: Policy zone: DMA32 Dec 13 14:30:30.843651 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:30.843658 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:30:30.843665 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:30:30.843673 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:30:30.843680 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:30:30.843687 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 169308K reserved, 0K cma-reserved) Dec 13 14:30:30.843695 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:30:30.843701 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:30:30.843708 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:30:30.843715 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:30:30.843723 kernel: rcu: RCU event tracing is enabled. Dec 13 14:30:30.843730 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:30:30.843738 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:30:30.843744 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:30:30.843751 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:30:30.843758 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:30:30.843766 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:30:30.843774 kernel: Console: colour dummy device 80x25 Dec 13 14:30:30.843782 kernel: printk: console [ttyS0] enabled Dec 13 14:30:30.843788 kernel: ACPI: Core revision 20210730 Dec 13 14:30:30.843796 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:30:30.843806 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:30:30.843813 kernel: x2apic enabled Dec 13 14:30:30.843822 kernel: Switched APIC routing to physical x2apic. Dec 13 14:30:30.843829 kernel: kvm-guest: setup PV IPIs Dec 13 14:30:30.843836 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:30:30.843843 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:30:30.843850 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:30:30.843857 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:30:30.843863 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:30:30.843871 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:30:30.843878 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:30:30.843885 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:30:30.843892 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:30:30.843899 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:30:30.843906 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:30:30.843913 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:30:30.843920 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:30:30.843927 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:30:30.843935 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:30:30.843942 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:30:30.843949 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:30:30.843956 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:30:30.843963 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:30:30.843970 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:30:30.843977 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:30:30.843984 kernel: LSM: Security Framework initializing Dec 13 14:30:30.843991 kernel: SELinux: Initializing. Dec 13 14:30:30.843998 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:30:30.844005 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:30:30.844013 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:30:30.844019 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:30:30.844026 kernel: ... version: 0 Dec 13 14:30:30.844033 kernel: ... bit width: 48 Dec 13 14:30:30.844040 kernel: ... generic registers: 6 Dec 13 14:30:30.844047 kernel: ... value mask: 0000ffffffffffff Dec 13 14:30:30.844054 kernel: ... max period: 00007fffffffffff Dec 13 14:30:30.844062 kernel: ... fixed-purpose events: 0 Dec 13 14:30:30.844068 kernel: ... event mask: 000000000000003f Dec 13 14:30:30.844075 kernel: signal: max sigframe size: 1776 Dec 13 14:30:30.844082 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:30:30.844089 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:30:30.844095 kernel: x86: Booting SMP configuration: Dec 13 14:30:30.844102 kernel: .... node #0, CPUs: #1 Dec 13 14:30:30.844109 kernel: kvm-clock: cpu 1, msr 5e19a041, secondary cpu clock Dec 13 14:30:30.844116 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:30:30.844124 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 14:30:30.844131 kernel: #2 Dec 13 14:30:30.844138 kernel: kvm-clock: cpu 2, msr 5e19a081, secondary cpu clock Dec 13 14:30:30.844145 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:30:30.844151 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 14:30:30.844158 kernel: #3 Dec 13 14:30:30.844165 kernel: kvm-clock: cpu 3, msr 5e19a0c1, secondary cpu clock Dec 13 14:30:30.844172 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:30:30.844178 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 14:30:30.844185 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:30:30.844193 kernel: smpboot: Max logical packages: 1 Dec 13 14:30:30.844200 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:30:30.844207 kernel: devtmpfs: initialized Dec 13 14:30:30.844214 kernel: x86/mm: Memory block size: 128MB Dec 13 14:30:30.844221 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 14:30:30.844228 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 14:30:30.844235 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 14:30:30.844264 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 14:30:30.844271 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 14:30:30.844279 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:30:30.844286 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:30:30.844293 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:30:30.844300 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:30:30.844307 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:30:30.844314 kernel: audit: type=2000 audit(1734100230.895:1): state=initialized audit_enabled=0 res=1 Dec 13 14:30:30.844321 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:30:30.844327 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:30:30.844335 kernel: cpuidle: using governor menu Dec 13 14:30:30.844342 kernel: ACPI: bus type PCI registered Dec 13 14:30:30.844349 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:30:30.844356 kernel: dca service started, version 1.12.1 Dec 13 14:30:30.844363 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:30:30.844370 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:30:30.844377 kernel: PCI: Using configuration type 1 for base access Dec 13 14:30:30.844384 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:30:30.844391 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:30:30.844399 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:30:30.844406 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:30:30.844412 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:30:30.844419 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:30:30.844426 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:30:30.844433 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:30:30.844440 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:30:30.844447 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:30:30.844462 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:30:30.844480 kernel: ACPI: Interpreter enabled Dec 13 14:30:30.844487 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:30:30.844494 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:30:30.844501 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:30:30.844518 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:30:30.844525 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:30:30.844709 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:30:30.844795 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:30:30.844866 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:30:30.844875 kernel: PCI host bridge to bus 0000:00 Dec 13 14:30:30.844947 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:30:30.845010 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:30:30.845071 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:30:30.845130 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:30:30.845191 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:30:30.845264 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 14:30:30.845325 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:30:30.845405 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:30:30.845481 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:30:30.845580 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 14:30:30.845658 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 14:30:30.845741 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 14:30:30.845810 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 14:30:30.845883 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:30:30.845960 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:30:30.846035 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 14:30:30.846106 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 14:30:30.846175 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 14:30:30.846263 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:30:30.846335 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 14:30:30.846404 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 14:30:30.846471 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 14:30:30.846567 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:30:30.846653 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 14:30:30.846732 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 14:30:30.846804 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 14:30:30.846872 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 14:30:30.846946 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:30:30.847014 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:30:30.847086 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:30:30.847156 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 14:30:30.847223 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 14:30:30.847312 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:30:30.847381 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 14:30:30.847390 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:30:30.847397 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:30:30.847404 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:30:30.847411 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:30:30.847418 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:30:30.847425 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:30:30.847435 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:30:30.847441 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:30:30.847448 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:30:30.847455 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:30:30.847462 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:30:30.847469 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:30:30.847476 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:30:30.847483 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:30:30.847492 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:30:30.847502 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:30:30.847523 kernel: iommu: Default domain type: Translated Dec 13 14:30:30.847530 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:30:30.847603 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:30:30.847672 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:30:30.847765 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:30:30.847783 kernel: vgaarb: loaded Dec 13 14:30:30.847791 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:30:30.847799 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:30:30.847811 kernel: PTP clock support registered Dec 13 14:30:30.847818 kernel: Registered efivars operations Dec 13 14:30:30.847827 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:30:30.847835 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:30:30.847841 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 14:30:30.847848 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 14:30:30.847855 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 14:30:30.847862 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 14:30:30.847869 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 14:30:30.847877 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 14:30:30.847884 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:30:30.847891 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:30:30.847898 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:30:30.847905 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:30:30.847913 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:30:30.847919 kernel: pnp: PnP ACPI init Dec 13 14:30:30.847997 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:30:30.848009 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:30:30.848016 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:30:30.848023 kernel: NET: Registered PF_INET protocol family Dec 13 14:30:30.848030 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:30:30.848037 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:30:30.848044 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:30:30.848051 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:30:30.848058 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:30:30.848067 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:30:30.848074 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:30:30.848081 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:30:30.848088 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:30:30.848095 kernel: NET: Registered PF_XDP protocol family Dec 13 14:30:30.848164 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 14:30:30.848233 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 14:30:30.848304 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:30:30.848378 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:30:30.848445 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:30:30.848534 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:30:30.848619 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:30:30.848702 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 14:30:30.848715 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:30:30.848724 kernel: Initialise system trusted keyrings Dec 13 14:30:30.848733 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:30:30.848742 kernel: Key type asymmetric registered Dec 13 14:30:30.848755 kernel: Asymmetric key parser 'x509' registered Dec 13 14:30:30.848765 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:30:30.848785 kernel: io scheduler mq-deadline registered Dec 13 14:30:30.848796 kernel: io scheduler kyber registered Dec 13 14:30:30.848806 kernel: io scheduler bfq registered Dec 13 14:30:30.848815 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:30:30.848826 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:30:30.848835 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:30:30.848845 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:30:30.848856 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:30:30.848866 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:30:30.848876 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:30:30.848886 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:30:30.848895 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:30:30.848905 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:30:30.849008 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:30:30.849090 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:30:30.849178 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:30:30 UTC (1734100230) Dec 13 14:30:30.849278 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:30:30.849291 kernel: efifb: probing for efifb Dec 13 14:30:30.849301 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 14:30:30.849311 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 14:30:30.849321 kernel: efifb: scrolling: redraw Dec 13 14:30:30.849330 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:30:30.849339 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 14:30:30.849348 kernel: fb0: EFI VGA frame buffer device Dec 13 14:30:30.849360 kernel: pstore: Registered efi as persistent store backend Dec 13 14:30:30.849370 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:30:30.849379 kernel: Segment Routing with IPv6 Dec 13 14:30:30.849391 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:30:30.849401 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:30:30.849412 kernel: Key type dns_resolver registered Dec 13 14:30:30.849421 kernel: IPI shorthand broadcast: enabled Dec 13 14:30:30.849431 kernel: sched_clock: Marking stable (459197963, 128510504)->(634041434, -46332967) Dec 13 14:30:30.849440 kernel: registered taskstats version 1 Dec 13 14:30:30.849449 kernel: Loading compiled-in X.509 certificates Dec 13 14:30:30.849459 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:30:30.849468 kernel: Key type .fscrypt registered Dec 13 14:30:30.849477 kernel: Key type fscrypt-provisioning registered Dec 13 14:30:30.849487 kernel: pstore: Using crash dump compression: deflate Dec 13 14:30:30.849499 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:30:30.849524 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:30:30.849535 kernel: ima: No architecture policies found Dec 13 14:30:30.849544 kernel: clk: Disabling unused clocks Dec 13 14:30:30.849554 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:30:30.849563 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:30:30.849582 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:30:30.849593 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:30:30.849602 kernel: Run /init as init process Dec 13 14:30:30.849635 kernel: with arguments: Dec 13 14:30:30.849650 kernel: /init Dec 13 14:30:30.849658 kernel: with environment: Dec 13 14:30:30.849665 kernel: HOME=/ Dec 13 14:30:30.849672 kernel: TERM=linux Dec 13 14:30:30.849680 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:30:30.849689 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:30:30.849699 systemd[1]: Detected virtualization kvm. Dec 13 14:30:30.849709 systemd[1]: Detected architecture x86-64. Dec 13 14:30:30.849717 systemd[1]: Running in initrd. Dec 13 14:30:30.849724 systemd[1]: No hostname configured, using default hostname. Dec 13 14:30:30.849732 systemd[1]: Hostname set to . Dec 13 14:30:30.849740 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:30:30.849748 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:30:30.849755 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:30:30.849763 systemd[1]: Reached target cryptsetup.target. Dec 13 14:30:30.849771 systemd[1]: Reached target paths.target. Dec 13 14:30:30.849779 systemd[1]: Reached target slices.target. Dec 13 14:30:30.849787 systemd[1]: Reached target swap.target. Dec 13 14:30:30.849794 systemd[1]: Reached target timers.target. Dec 13 14:30:30.849802 systemd[1]: Listening on iscsid.socket. Dec 13 14:30:30.849810 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:30:30.849818 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:30:30.849826 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:30:30.849835 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:30:30.849848 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:30:30.849855 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:30:30.849863 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:30:30.849871 systemd[1]: Reached target sockets.target. Dec 13 14:30:30.849879 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:30:30.849887 systemd[1]: Finished network-cleanup.service. Dec 13 14:30:30.849894 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:30:30.849902 systemd[1]: Starting systemd-journald.service... Dec 13 14:30:30.849911 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:30:30.849919 systemd[1]: Starting systemd-resolved.service... Dec 13 14:30:30.849927 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:30:30.849934 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:30:30.849942 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:30:30.849950 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:30:30.849958 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:30:30.849966 kernel: audit: type=1130 audit(1734100230.841:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.849974 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:30:30.849983 kernel: audit: type=1130 audit(1734100230.846:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.849994 systemd-journald[197]: Journal started Dec 13 14:30:30.850035 systemd-journald[197]: Runtime Journal (/run/log/journal/c5118f1bec5048f2a3465b3c9ac60945) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:30:30.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.844491 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 14:30:30.852287 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:30:30.854968 systemd[1]: Started systemd-journald.service. Dec 13 14:30:30.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.858544 kernel: audit: type=1130 audit(1734100230.854:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.866516 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:30:30.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.869059 systemd-resolved[199]: Positive Trust Anchors: Dec 13 14:30:30.872340 kernel: audit: type=1130 audit(1734100230.867:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.869078 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:30:30.869107 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:30:30.871283 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 14:30:30.884095 kernel: audit: type=1130 audit(1734100230.872:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.871474 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:30:30.872952 systemd[1]: Started systemd-resolved.service. Dec 13 14:30:30.873290 systemd[1]: Reached target nss-lookup.target. Dec 13 14:30:30.890538 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:30:30.894953 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 14:30:30.896062 kernel: Bridge firewalling registered Dec 13 14:30:30.896591 dracut-cmdline[216]: dracut-dracut-053 Dec 13 14:30:30.899046 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:30.919529 kernel: SCSI subsystem initialized Dec 13 14:30:30.934807 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:30:30.934835 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:30:30.936458 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:30:30.940120 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 14:30:30.941008 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:30:30.945926 kernel: audit: type=1130 audit(1734100230.941:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.942625 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:30:30.953089 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:30:30.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.957544 kernel: audit: type=1130 audit(1734100230.954:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:30.961554 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:30:30.977550 kernel: iscsi: registered transport (tcp) Dec 13 14:30:30.999917 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:30:30.999986 kernel: QLogic iSCSI HBA Driver Dec 13 14:30:31.029499 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:30:31.034462 kernel: audit: type=1130 audit(1734100231.029:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:31.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:31.034499 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:30:31.087561 kernel: raid6: avx2x4 gen() 19747 MB/s Dec 13 14:30:31.104542 kernel: raid6: avx2x4 xor() 6008 MB/s Dec 13 14:30:31.121540 kernel: raid6: avx2x2 gen() 19990 MB/s Dec 13 14:30:31.138545 kernel: raid6: avx2x2 xor() 12848 MB/s Dec 13 14:30:31.155544 kernel: raid6: avx2x1 gen() 19327 MB/s Dec 13 14:30:31.172540 kernel: raid6: avx2x1 xor() 12506 MB/s Dec 13 14:30:31.189556 kernel: raid6: sse2x4 gen() 12667 MB/s Dec 13 14:30:31.206541 kernel: raid6: sse2x4 xor() 5982 MB/s Dec 13 14:30:31.223540 kernel: raid6: sse2x2 gen() 15372 MB/s Dec 13 14:30:31.240540 kernel: raid6: sse2x2 xor() 9736 MB/s Dec 13 14:30:31.257555 kernel: raid6: sse2x1 gen() 11900 MB/s Dec 13 14:30:31.274927 kernel: raid6: sse2x1 xor() 7759 MB/s Dec 13 14:30:31.274961 kernel: raid6: using algorithm avx2x2 gen() 19990 MB/s Dec 13 14:30:31.274971 kernel: raid6: .... xor() 12848 MB/s, rmw enabled Dec 13 14:30:31.275636 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:30:31.287534 kernel: xor: automatically using best checksumming function avx Dec 13 14:30:31.386551 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:30:31.398403 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:30:31.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:31.402000 audit: BPF prog-id=7 op=LOAD Dec 13 14:30:31.402000 audit: BPF prog-id=8 op=LOAD Dec 13 14:30:31.403537 kernel: audit: type=1130 audit(1734100231.399:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:31.403566 systemd[1]: Starting systemd-udevd.service... Dec 13 14:30:31.420124 systemd-udevd[400]: Using default interface naming scheme 'v252'. Dec 13 14:30:31.425562 systemd[1]: Started systemd-udevd.service. Dec 13 14:30:31.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:31.429456 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:30:31.438672 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation Dec 13 14:30:31.462418 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:30:31.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:31.464323 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:30:31.507017 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:30:31.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:31.535002 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:30:31.541979 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:30:31.542000 kernel: GPT:9289727 != 19775487 Dec 13 14:30:31.542012 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:30:31.542024 kernel: GPT:9289727 != 19775487 Dec 13 14:30:31.542035 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:30:31.542045 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:30:31.546534 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:30:31.549562 kernel: libata version 3.00 loaded. Dec 13 14:30:31.565556 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:30:31.565610 kernel: AES CTR mode by8 optimization enabled Dec 13 14:30:31.567238 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:30:31.592614 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:30:31.592635 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:30:31.592760 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:30:31.592878 kernel: scsi host0: ahci Dec 13 14:30:31.592989 kernel: scsi host1: ahci Dec 13 14:30:31.593088 kernel: scsi host2: ahci Dec 13 14:30:31.593191 kernel: scsi host3: ahci Dec 13 14:30:31.593309 kernel: scsi host4: ahci Dec 13 14:30:31.593406 kernel: scsi host5: ahci Dec 13 14:30:31.593552 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 14:30:31.593565 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 14:30:31.593579 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 14:30:31.593590 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 14:30:31.593601 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (440) Dec 13 14:30:31.593613 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 14:30:31.593625 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 14:30:31.596018 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:30:31.599648 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:30:31.600123 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:30:31.603913 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:30:31.605982 systemd[1]: Starting disk-uuid.service... Dec 13 14:30:31.612880 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:30:31.616252 disk-uuid[527]: Primary Header is updated. Dec 13 14:30:31.616252 disk-uuid[527]: Secondary Entries is updated. Dec 13 14:30:31.616252 disk-uuid[527]: Secondary Header is updated. Dec 13 14:30:31.619694 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:30:31.901914 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:30:31.901975 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:30:31.901986 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:30:31.901994 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:30:31.903543 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:30:31.904543 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:30:31.905657 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:30:31.905674 kernel: ata3.00: applying bridge limits Dec 13 14:30:31.907004 kernel: ata3.00: configured for UDMA/100 Dec 13 14:30:31.907532 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:30:31.938553 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:30:31.956184 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:30:31.956202 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:30:32.622539 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:30:32.623000 disk-uuid[528]: The operation has completed successfully. Dec 13 14:30:32.643998 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:30:32.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.644094 systemd[1]: Finished disk-uuid.service. Dec 13 14:30:32.653946 systemd[1]: Starting verity-setup.service... Dec 13 14:30:32.667540 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:30:32.689070 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:30:32.691672 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:30:32.694968 systemd[1]: Finished verity-setup.service. Dec 13 14:30:32.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.765329 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:30:32.766752 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:30:32.765890 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:30:32.766747 systemd[1]: Starting ignition-setup.service... Dec 13 14:30:32.768748 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:30:32.779533 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:30:32.779571 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:30:32.779584 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:30:32.788444 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:30:32.796640 systemd[1]: Finished ignition-setup.service. Dec 13 14:30:32.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.797851 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:30:32.834857 ignition[650]: Ignition 2.14.0 Dec 13 14:30:32.834869 ignition[650]: Stage: fetch-offline Dec 13 14:30:32.834921 ignition[650]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:30:32.834929 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:30:32.835035 ignition[650]: parsed url from cmdline: "" Dec 13 14:30:32.835038 ignition[650]: no config URL provided Dec 13 14:30:32.835045 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:30:32.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.841000 audit: BPF prog-id=9 op=LOAD Dec 13 14:30:32.839165 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:30:32.835052 ignition[650]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:30:32.842012 systemd[1]: Starting systemd-networkd.service... Dec 13 14:30:32.835068 ignition[650]: op(1): [started] loading QEMU firmware config module Dec 13 14:30:32.835075 ignition[650]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:30:32.848404 ignition[650]: op(1): [finished] loading QEMU firmware config module Dec 13 14:30:32.850107 ignition[650]: parsing config with SHA512: ed29eba5e42e468df0aad117d23703f8955ba20927629047e046f485c885405d8d0a0114de5c4eb11f59204a7434202f58a9a6f88f8688fe0a045cc94c6f2303 Dec 13 14:30:32.855400 unknown[650]: fetched base config from "system" Dec 13 14:30:32.856161 unknown[650]: fetched user config from "qemu" Dec 13 14:30:32.857320 ignition[650]: fetch-offline: fetch-offline passed Dec 13 14:30:32.857864 ignition[650]: Ignition finished successfully Dec 13 14:30:32.860037 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:30:32.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.871091 systemd-networkd[721]: lo: Link UP Dec 13 14:30:32.871103 systemd-networkd[721]: lo: Gained carrier Dec 13 14:30:32.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.871647 systemd-networkd[721]: Enumeration completed Dec 13 14:30:32.871744 systemd[1]: Started systemd-networkd.service. Dec 13 14:30:32.871886 systemd-networkd[721]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:30:32.873233 systemd-networkd[721]: eth0: Link UP Dec 13 14:30:32.873237 systemd-networkd[721]: eth0: Gained carrier Dec 13 14:30:32.873672 systemd[1]: Reached target network.target. Dec 13 14:30:32.874130 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:30:32.875773 systemd[1]: Starting ignition-kargs.service... Dec 13 14:30:32.877007 systemd[1]: Starting iscsiuio.service... Dec 13 14:30:32.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.881942 systemd[1]: Started iscsiuio.service. Dec 13 14:30:32.884598 systemd[1]: Starting iscsid.service... Dec 13 14:30:32.886161 systemd-networkd[721]: eth0: DHCPv4 address 10.0.0.141/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:30:32.888932 systemd[1]: Started iscsid.service. Dec 13 14:30:32.889910 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:30:32.889910 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:30:32.889910 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:30:32.889910 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:30:32.889910 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:30:32.889910 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:30:32.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.891565 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:30:32.902042 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:30:32.906090 ignition[723]: Ignition 2.14.0 Dec 13 14:30:32.903852 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:30:32.906097 ignition[723]: Stage: kargs Dec 13 14:30:32.905539 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:30:32.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.906180 ignition[723]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:30:32.906520 systemd[1]: Reached target remote-fs.target. Dec 13 14:30:32.906188 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:30:32.909094 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:30:32.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.907174 ignition[723]: kargs: kargs passed Dec 13 14:30:32.910850 systemd[1]: Finished ignition-kargs.service. Dec 13 14:30:32.907231 ignition[723]: Ignition finished successfully Dec 13 14:30:32.912808 systemd[1]: Starting ignition-disks.service... Dec 13 14:30:32.919550 ignition[743]: Ignition 2.14.0 Dec 13 14:30:32.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.916714 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:30:32.919557 ignition[743]: Stage: disks Dec 13 14:30:32.921266 systemd[1]: Finished ignition-disks.service. Dec 13 14:30:32.919646 ignition[743]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:30:32.922479 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:30:32.919654 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:30:32.924000 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:30:32.920463 ignition[743]: disks: disks passed Dec 13 14:30:32.925698 systemd[1]: Reached target local-fs.target. Dec 13 14:30:32.920501 ignition[743]: Ignition finished successfully Dec 13 14:30:32.927129 systemd[1]: Reached target sysinit.target. Dec 13 14:30:32.928706 systemd[1]: Reached target basic.target. Dec 13 14:30:32.931355 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:30:32.941606 systemd-fsck[755]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:30:32.946622 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:30:32.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.949200 systemd[1]: Mounting sysroot.mount... Dec 13 14:30:32.954591 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:30:32.954822 systemd[1]: Mounted sysroot.mount. Dec 13 14:30:32.955120 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:30:32.958031 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:30:32.958772 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:30:32.958806 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:30:32.958824 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:30:32.967089 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:30:32.968565 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:30:32.974369 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:30:32.977334 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:30:32.981150 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:30:32.983946 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:30:33.009940 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:30:33.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:33.012612 systemd[1]: Starting ignition-mount.service... Dec 13 14:30:33.014036 systemd[1]: Starting sysroot-boot.service... Dec 13 14:30:33.018373 bash[806]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:30:33.027537 ignition[808]: INFO : Ignition 2.14.0 Dec 13 14:30:33.027537 ignition[808]: INFO : Stage: mount Dec 13 14:30:33.029304 ignition[808]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:30:33.029304 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:30:33.029304 ignition[808]: INFO : mount: mount passed Dec 13 14:30:33.029304 ignition[808]: INFO : Ignition finished successfully Dec 13 14:30:33.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:33.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:33.029074 systemd[1]: Finished sysroot-boot.service. Dec 13 14:30:33.030234 systemd[1]: Finished ignition-mount.service. Dec 13 14:30:33.701968 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:30:33.710447 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (817) Dec 13 14:30:33.710476 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:30:33.710489 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:30:33.711257 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:30:33.715229 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:30:33.717633 systemd[1]: Starting ignition-files.service... Dec 13 14:30:33.732053 ignition[837]: INFO : Ignition 2.14.0 Dec 13 14:30:33.732053 ignition[837]: INFO : Stage: files Dec 13 14:30:33.733859 ignition[837]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:30:33.733859 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:30:33.736630 ignition[837]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:30:33.738414 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:30:33.738414 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:30:33.741233 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:30:33.742659 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:30:33.744450 unknown[837]: wrote ssh authorized keys file for user: core Dec 13 14:30:33.745546 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:30:33.747150 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:30:33.748928 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:30:33.750655 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:30:33.752394 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:30:33.754097 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:30:33.756605 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:30:33.759023 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:30:33.761110 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:30:34.134759 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 14:30:34.157630 systemd-networkd[721]: eth0: Gained IPv6LL Dec 13 14:30:34.518704 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:30:34.518704 ignition[837]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Dec 13 14:30:34.522255 ignition[837]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:30:34.524225 ignition[837]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:30:34.524225 ignition[837]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Dec 13 14:30:34.527352 ignition[837]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:30:34.527352 ignition[837]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:30:34.545413 ignition[837]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:30:34.547093 ignition[837]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:30:34.548653 ignition[837]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:30:34.550391 ignition[837]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:30:34.552036 ignition[837]: INFO : files: files passed Dec 13 14:30:34.552789 ignition[837]: INFO : Ignition finished successfully Dec 13 14:30:34.554716 systemd[1]: Finished ignition-files.service. Dec 13 14:30:34.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.556366 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:30:34.556812 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:30:34.557394 systemd[1]: Starting ignition-quench.service... Dec 13 14:30:34.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.559874 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:30:34.559949 systemd[1]: Finished ignition-quench.service. Dec 13 14:30:34.567700 initrd-setup-root-after-ignition[862]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:30:34.570440 initrd-setup-root-after-ignition[864]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:30:34.571023 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:30:34.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.572618 systemd[1]: Reached target ignition-complete.target. Dec 13 14:30:34.575105 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:30:34.585968 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:30:34.586071 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:30:34.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.587965 systemd[1]: Reached target initrd-fs.target. Dec 13 14:30:34.589349 systemd[1]: Reached target initrd.target. Dec 13 14:30:34.590840 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:30:34.592799 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:30:34.603991 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:30:34.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.606483 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:30:34.617835 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:30:34.618280 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:30:34.620031 systemd[1]: Stopped target timers.target. Dec 13 14:30:34.622647 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:30:34.622777 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:30:34.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.624571 systemd[1]: Stopped target initrd.target. Dec 13 14:30:34.625856 systemd[1]: Stopped target basic.target. Dec 13 14:30:34.627861 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:30:34.628414 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:30:34.631295 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:30:34.633033 systemd[1]: Stopped target remote-fs.target. Dec 13 14:30:34.633600 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:30:34.635043 systemd[1]: Stopped target sysinit.target. Dec 13 14:30:34.636622 systemd[1]: Stopped target local-fs.target. Dec 13 14:30:34.639080 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:30:34.640740 systemd[1]: Stopped target swap.target. Dec 13 14:30:34.641258 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:30:34.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.641379 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:30:34.642975 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:30:34.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.644382 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:30:34.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.644482 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:30:34.645962 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:30:34.646066 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:30:34.647486 systemd[1]: Stopped target paths.target. Dec 13 14:30:34.649180 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:30:34.652557 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:30:34.653129 systemd[1]: Stopped target slices.target. Dec 13 14:30:34.655350 systemd[1]: Stopped target sockets.target. Dec 13 14:30:34.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.656937 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:30:34.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.657053 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:30:34.658985 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:30:34.659088 systemd[1]: Stopped ignition-files.service. Dec 13 14:30:34.661534 systemd[1]: Stopping ignition-mount.service... Dec 13 14:30:34.667692 iscsid[727]: iscsid shutting down. Dec 13 14:30:34.663093 systemd[1]: Stopping iscsid.service... Dec 13 14:30:34.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.670478 ignition[877]: INFO : Ignition 2.14.0 Dec 13 14:30:34.670478 ignition[877]: INFO : Stage: umount Dec 13 14:30:34.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.665206 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:30:34.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.674934 ignition[877]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:30:34.674934 ignition[877]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:30:34.674934 ignition[877]: INFO : umount: umount passed Dec 13 14:30:34.674934 ignition[877]: INFO : Ignition finished successfully Dec 13 14:30:34.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.668069 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:30:34.668219 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:30:34.670147 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:30:34.670269 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:30:34.672803 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:30:34.672889 systemd[1]: Stopped ignition-mount.service. Dec 13 14:30:34.674467 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:30:34.674552 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:30:34.675994 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:30:34.676027 systemd[1]: Stopped ignition-disks.service. Dec 13 14:30:34.677358 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:30:34.677387 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:30:34.679805 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:30:34.679838 systemd[1]: Stopped ignition-setup.service. Dec 13 14:30:34.684532 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:30:34.701686 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:30:34.701788 systemd[1]: Stopped iscsid.service. Dec 13 14:30:34.703658 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:30:34.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.703685 systemd[1]: Closed iscsid.socket. Dec 13 14:30:34.704961 systemd[1]: Stopping iscsiuio.service... Dec 13 14:30:34.710849 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:30:34.711935 systemd[1]: Stopped iscsiuio.service. Dec 13 14:30:34.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.713763 systemd[1]: Stopped target network.target. Dec 13 14:30:34.715495 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:30:34.715550 systemd[1]: Closed iscsiuio.socket. Dec 13 14:30:34.718072 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:30:34.719985 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:30:34.725589 systemd-networkd[721]: eth0: DHCPv6 lease lost Dec 13 14:30:34.726820 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:30:34.727847 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:30:34.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.729969 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:30:34.731010 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:30:34.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.733228 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:30:34.733262 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:30:34.734000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:30:34.735000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:30:34.736553 systemd[1]: Stopping network-cleanup.service... Dec 13 14:30:34.738190 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:30:34.738231 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:30:34.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.740163 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:30:34.741035 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:30:34.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.743612 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:30:34.743645 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:30:34.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.746546 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:30:34.750120 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:30:34.753822 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:30:34.754895 systemd[1]: Stopped network-cleanup.service. Dec 13 14:30:34.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.756819 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:30:34.757980 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:30:34.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.759996 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:30:34.760036 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:30:34.763068 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:30:34.763107 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:30:34.765724 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:30:34.765761 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:30:34.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.768213 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:30:34.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.768248 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:30:34.770089 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:30:34.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.770118 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:30:34.773976 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:30:34.775706 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:30:34.775751 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:30:34.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.778627 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:30:34.778666 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:30:34.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.781101 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:30:34.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.781132 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:30:34.784563 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:30:34.786327 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:30:34.787292 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:30:34.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.788927 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:30:34.789998 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:30:34.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.791872 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:30:34.793581 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:30:34.793614 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:30:34.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:34.796604 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:30:34.813057 systemd[1]: Switching root. Dec 13 14:30:34.831128 systemd-journald[197]: Journal stopped Dec 13 14:30:37.288133 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 14:30:37.288194 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:30:37.288211 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:30:37.288228 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:30:37.288242 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:30:37.288256 kernel: SELinux: policy capability open_perms=1 Dec 13 14:30:37.288269 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:30:37.288283 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:30:37.288296 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:30:37.288313 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:30:37.288328 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:30:37.288344 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:30:37.288361 systemd[1]: Successfully loaded SELinux policy in 38.133ms. Dec 13 14:30:37.288378 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.416ms. Dec 13 14:30:37.288396 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:30:37.288413 systemd[1]: Detected virtualization kvm. Dec 13 14:30:37.288428 systemd[1]: Detected architecture x86-64. Dec 13 14:30:37.288442 systemd[1]: Detected first boot. Dec 13 14:30:37.288457 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:30:37.288472 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:30:37.288488 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:30:37.288519 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:30:37.288535 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:30:37.288552 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:30:37.288567 kernel: kauditd_printk_skb: 81 callbacks suppressed Dec 13 14:30:37.288581 kernel: audit: type=1334 audit(1734100237.145:85): prog-id=12 op=LOAD Dec 13 14:30:37.288599 kernel: audit: type=1334 audit(1734100237.145:86): prog-id=3 op=UNLOAD Dec 13 14:30:37.288613 kernel: audit: type=1334 audit(1734100237.146:87): prog-id=13 op=LOAD Dec 13 14:30:37.288629 kernel: audit: type=1334 audit(1734100237.148:88): prog-id=14 op=LOAD Dec 13 14:30:37.288643 kernel: audit: type=1334 audit(1734100237.149:89): prog-id=4 op=UNLOAD Dec 13 14:30:37.288657 kernel: audit: type=1334 audit(1734100237.149:90): prog-id=5 op=UNLOAD Dec 13 14:30:37.288671 kernel: audit: type=1334 audit(1734100237.151:91): prog-id=15 op=LOAD Dec 13 14:30:37.288685 kernel: audit: type=1334 audit(1734100237.151:92): prog-id=12 op=UNLOAD Dec 13 14:30:37.288699 kernel: audit: type=1334 audit(1734100237.153:93): prog-id=16 op=LOAD Dec 13 14:30:37.288713 kernel: audit: type=1334 audit(1734100237.154:94): prog-id=17 op=LOAD Dec 13 14:30:37.288729 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:30:37.288744 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:30:37.288759 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:30:37.288775 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:30:37.288790 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:30:37.288805 systemd[1]: Created slice system-getty.slice. Dec 13 14:30:37.288820 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:30:37.288835 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:30:37.288854 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:30:37.288869 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:30:37.288884 systemd[1]: Created slice user.slice. Dec 13 14:30:37.288899 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:30:37.288914 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:30:37.288930 systemd[1]: Set up automount boot.automount. Dec 13 14:30:37.288947 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:30:37.288962 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:30:37.288981 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:30:37.289000 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:30:37.289019 systemd[1]: Reached target integritysetup.target. Dec 13 14:30:37.289037 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:30:37.289056 systemd[1]: Reached target remote-fs.target. Dec 13 14:30:37.289075 systemd[1]: Reached target slices.target. Dec 13 14:30:37.289104 systemd[1]: Reached target swap.target. Dec 13 14:30:37.289125 systemd[1]: Reached target torcx.target. Dec 13 14:30:37.289143 systemd[1]: Reached target veritysetup.target. Dec 13 14:30:37.289162 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:30:37.289180 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:30:37.289195 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:30:37.289210 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:30:37.289226 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:30:37.289241 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:30:37.289256 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:30:37.289271 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:30:37.289286 systemd[1]: Mounting media.mount... Dec 13 14:30:37.289301 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:37.289316 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:30:37.289331 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:30:37.289347 systemd[1]: Mounting tmp.mount... Dec 13 14:30:37.289362 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:30:37.289377 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:30:37.289392 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:30:37.289409 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:30:37.289424 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:30:37.289439 systemd[1]: Starting modprobe@drm.service... Dec 13 14:30:37.289455 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:30:37.289470 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:30:37.289485 systemd[1]: Starting modprobe@loop.service... Dec 13 14:30:37.289501 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:30:37.289532 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:30:37.289547 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:30:37.289565 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:30:37.289580 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:30:37.289595 kernel: fuse: init (API version 7.34) Dec 13 14:30:37.289610 systemd[1]: Stopped systemd-journald.service. Dec 13 14:30:37.289624 kernel: loop: module loaded Dec 13 14:30:37.289638 systemd[1]: Starting systemd-journald.service... Dec 13 14:30:37.289653 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:30:37.289668 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:30:37.289685 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:30:37.289702 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:30:37.289717 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:30:37.289733 systemd[1]: Stopped verity-setup.service. Dec 13 14:30:37.289748 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:37.289763 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:30:37.289778 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:30:37.289792 systemd[1]: Mounted media.mount. Dec 13 14:30:37.289810 systemd-journald[987]: Journal started Dec 13 14:30:37.289859 systemd-journald[987]: Runtime Journal (/run/log/journal/c5118f1bec5048f2a3465b3c9ac60945) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:30:34.888000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:30:35.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:30:35.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:30:35.040000 audit: BPF prog-id=10 op=LOAD Dec 13 14:30:35.040000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:30:35.040000 audit: BPF prog-id=11 op=LOAD Dec 13 14:30:35.040000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:30:35.072000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:30:35.072000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001458b2 a1=c0000c6de0 a2=c0000cf0c0 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:35.072000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:30:35.074000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:30:35.074000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000145989 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:35.074000 audit: CWD cwd="/" Dec 13 14:30:35.074000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:35.074000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:35.074000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:30:37.145000 audit: BPF prog-id=12 op=LOAD Dec 13 14:30:37.145000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:30:37.146000 audit: BPF prog-id=13 op=LOAD Dec 13 14:30:37.148000 audit: BPF prog-id=14 op=LOAD Dec 13 14:30:37.149000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:30:37.149000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:30:37.151000 audit: BPF prog-id=15 op=LOAD Dec 13 14:30:37.151000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:30:37.153000 audit: BPF prog-id=16 op=LOAD Dec 13 14:30:37.154000 audit: BPF prog-id=17 op=LOAD Dec 13 14:30:37.154000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:30:37.154000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:30:37.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.166000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:30:37.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.262000 audit: BPF prog-id=18 op=LOAD Dec 13 14:30:37.263000 audit: BPF prog-id=19 op=LOAD Dec 13 14:30:37.263000 audit: BPF prog-id=20 op=LOAD Dec 13 14:30:37.263000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:30:37.263000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:30:37.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.285000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:30:37.285000 audit[987]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe49c7c010 a2=4000 a3=7ffe49c7c0ac items=0 ppid=1 pid=987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:37.285000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:30:37.144221 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:30:35.071469 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:30:37.144233 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:30:35.071743 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:30:37.155984 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:30:35.071763 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:30:35.071795 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:30:35.071805 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:30:35.071835 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:30:35.071849 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:30:35.072078 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:30:35.072115 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:30:35.072130 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:30:35.072485 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:30:35.072535 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:30:37.292709 systemd[1]: Started systemd-journald.service. Dec 13 14:30:35.072554 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:30:37.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:35.072568 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:30:35.072587 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:30:35.072599 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:30:36.898837 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:30:37.293261 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:30:36.899075 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:30:36.899178 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:30:36.899324 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:30:36.899368 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:30:36.899419 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:30:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:30:37.294262 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:30:37.295249 systemd[1]: Mounted tmp.mount. Dec 13 14:30:37.296187 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:30:37.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.297304 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:30:37.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.298363 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:30:37.298494 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:30:37.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.299583 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:30:37.299699 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:30:37.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.300718 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:30:37.300836 systemd[1]: Finished modprobe@drm.service. Dec 13 14:30:37.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.301887 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:30:37.301997 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:30:37.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.303156 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:30:37.303282 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:30:37.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.304319 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:30:37.304434 systemd[1]: Finished modprobe@loop.service. Dec 13 14:30:37.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.305583 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:30:37.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.306777 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:30:37.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.307979 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:30:37.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.309209 systemd[1]: Reached target network-pre.target. Dec 13 14:30:37.310991 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:30:37.312695 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:30:37.313483 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:30:37.316316 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:30:37.318015 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:30:37.319129 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:30:37.319918 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:30:37.320982 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:30:37.321879 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:30:37.323354 systemd-journald[987]: Time spent on flushing to /var/log/journal/c5118f1bec5048f2a3465b3c9ac60945 is 20.156ms for 1147 entries. Dec 13 14:30:37.323354 systemd-journald[987]: System Journal (/var/log/journal/c5118f1bec5048f2a3465b3c9ac60945) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:30:37.367949 systemd-journald[987]: Received client request to flush runtime journal. Dec 13 14:30:37.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.323785 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:30:37.327560 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:30:37.368659 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:30:37.328766 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:30:37.329896 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:30:37.331887 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:30:37.334879 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:30:37.336368 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:30:37.337950 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:30:37.343324 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:30:37.345134 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:30:37.360779 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:30:37.368771 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:30:37.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.814634 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:30:37.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.815000 audit: BPF prog-id=21 op=LOAD Dec 13 14:30:37.815000 audit: BPF prog-id=22 op=LOAD Dec 13 14:30:37.815000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:30:37.815000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:30:37.816744 systemd[1]: Starting systemd-udevd.service... Dec 13 14:30:37.831899 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Dec 13 14:30:37.843886 systemd[1]: Started systemd-udevd.service. Dec 13 14:30:37.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.845000 audit: BPF prog-id=23 op=LOAD Dec 13 14:30:37.849876 systemd[1]: Starting systemd-networkd.service... Dec 13 14:30:37.855904 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:30:37.854000 audit: BPF prog-id=24 op=LOAD Dec 13 14:30:37.854000 audit: BPF prog-id=25 op=LOAD Dec 13 14:30:37.854000 audit: BPF prog-id=26 op=LOAD Dec 13 14:30:37.863247 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:30:37.890121 systemd[1]: Started systemd-userdbd.service. Dec 13 14:30:37.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.898872 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:30:37.901544 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:30:37.922586 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:30:37.931610 systemd-networkd[1038]: lo: Link UP Dec 13 14:30:37.931622 systemd-networkd[1038]: lo: Gained carrier Dec 13 14:30:37.931960 systemd-networkd[1038]: Enumeration completed Dec 13 14:30:37.932054 systemd-networkd[1038]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:30:37.932065 systemd[1]: Started systemd-networkd.service. Dec 13 14:30:37.933071 systemd-networkd[1038]: eth0: Link UP Dec 13 14:30:37.933089 systemd-networkd[1038]: eth0: Gained carrier Dec 13 14:30:37.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:37.942000 audit[1027]: AVC avc: denied { confidentiality } for pid=1027 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:30:37.945605 systemd-networkd[1038]: eth0: DHCPv4 address 10.0.0.141/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:30:37.942000 audit[1027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564f7b2ece20 a1=337fc a2=7f76da86fbc5 a3=5 items=110 ppid=1019 pid=1027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:37.942000 audit: CWD cwd="/" Dec 13 14:30:37.942000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=1 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=2 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=3 name=(null) inode=12102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=4 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=5 name=(null) inode=12103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=6 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=7 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=8 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=9 name=(null) inode=12105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=10 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=11 name=(null) inode=12106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=12 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=13 name=(null) inode=12107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=14 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=15 name=(null) inode=12108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=16 name=(null) inode=12104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=17 name=(null) inode=12109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=18 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=19 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=20 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=21 name=(null) inode=12111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=22 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=23 name=(null) inode=12112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=24 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=25 name=(null) inode=12113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=26 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=27 name=(null) inode=12114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=28 name=(null) inode=12110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=29 name=(null) inode=12115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=30 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=31 name=(null) inode=12116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=32 name=(null) inode=12116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=33 name=(null) inode=12117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=34 name=(null) inode=12116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=35 name=(null) inode=12118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=36 name=(null) inode=12116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=37 name=(null) inode=12119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=38 name=(null) inode=12116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=39 name=(null) inode=12120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=40 name=(null) inode=12116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=41 name=(null) inode=12121 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=42 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=43 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=44 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=45 name=(null) inode=12123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=46 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=47 name=(null) inode=12124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=48 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=49 name=(null) inode=12125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=50 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=51 name=(null) inode=12126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=52 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=53 name=(null) inode=12127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=55 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=56 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=57 name=(null) inode=12129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=58 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=59 name=(null) inode=12130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=60 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=61 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=62 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=63 name=(null) inode=12132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=64 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=65 name=(null) inode=12133 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=66 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=67 name=(null) inode=12134 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=68 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=69 name=(null) inode=12135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=70 name=(null) inode=12131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=71 name=(null) inode=12136 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=72 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=73 name=(null) inode=12137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=74 name=(null) inode=12137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=75 name=(null) inode=12138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=76 name=(null) inode=12137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=77 name=(null) inode=12139 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=78 name=(null) inode=12137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=79 name=(null) inode=12140 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=80 name=(null) inode=12137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=81 name=(null) inode=12141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=82 name=(null) inode=12137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=83 name=(null) inode=12142 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=84 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=85 name=(null) inode=12143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=86 name=(null) inode=12143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=87 name=(null) inode=12144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=88 name=(null) inode=12143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=89 name=(null) inode=12145 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=90 name=(null) inode=12143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=91 name=(null) inode=12146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=92 name=(null) inode=12143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=93 name=(null) inode=12147 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=94 name=(null) inode=12143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=95 name=(null) inode=12148 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=96 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=97 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=98 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=99 name=(null) inode=12150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=100 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=101 name=(null) inode=12151 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=102 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=103 name=(null) inode=12152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=104 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=105 name=(null) inode=12153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=106 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=107 name=(null) inode=12154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PATH item=109 name=(null) inode=12155 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:37.942000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:30:37.960686 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 14:30:37.971073 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:30:37.971212 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:30:37.971323 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:30:37.978532 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:30:37.982532 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:30:38.012894 kernel: kvm: Nested Virtualization enabled Dec 13 14:30:38.012971 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:30:38.012985 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:30:38.014530 kernel: SVM: Virtual GIF supported Dec 13 14:30:38.031542 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:30:38.059878 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:30:38.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.062100 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:30:38.069888 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:30:38.096499 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:30:38.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.097461 systemd[1]: Reached target cryptsetup.target. Dec 13 14:30:38.099089 systemd[1]: Starting lvm2-activation.service... Dec 13 14:30:38.102696 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:30:38.128446 systemd[1]: Finished lvm2-activation.service. Dec 13 14:30:38.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.129442 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:30:38.130373 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:30:38.130396 systemd[1]: Reached target local-fs.target. Dec 13 14:30:38.131281 systemd[1]: Reached target machines.target. Dec 13 14:30:38.133020 systemd[1]: Starting ldconfig.service... Dec 13 14:30:38.134029 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.134085 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:30:38.134850 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:30:38.136818 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:30:38.139553 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:30:38.141817 systemd[1]: Starting systemd-sysext.service... Dec 13 14:30:38.143102 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Dec 13 14:30:38.144224 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:30:38.153242 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:30:38.157821 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:30:38.157991 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:30:38.204547 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:30:38.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.347695 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:30:38.348297 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:30:38.352533 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:30:38.364793 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Dec 13 14:30:38.364793 systemd-fsck[1066]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 14:30:38.367538 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:30:38.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.367978 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:30:38.370462 systemd[1]: Mounting boot.mount... Dec 13 14:30:38.373909 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:30:38.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.376645 (sd-sysext)[1071]: Using extensions 'kubernetes'. Dec 13 14:30:38.376989 (sd-sysext)[1071]: Merged extensions into '/usr'. Dec 13 14:30:38.387460 systemd[1]: Mounted boot.mount. Dec 13 14:30:38.397109 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.398738 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:30:38.399799 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.401059 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:30:38.403044 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:30:38.405245 systemd[1]: Starting modprobe@loop.service... Dec 13 14:30:38.406043 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.406183 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:30:38.406305 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.409363 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:30:38.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.410891 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:30:38.412366 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:30:38.412532 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:30:38.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.414014 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:30:38.414161 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:30:38.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.415604 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:30:38.415753 systemd[1]: Finished modprobe@loop.service. Dec 13 14:30:38.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.417328 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:30:38.417461 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.418984 systemd[1]: Finished systemd-sysext.service. Dec 13 14:30:38.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.421225 systemd[1]: Starting ensure-sysext.service... Dec 13 14:30:38.423295 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:30:38.429116 systemd[1]: Reloading. Dec 13 14:30:38.434478 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:30:38.435311 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:30:38.437416 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:30:38.444097 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:30:38.478628 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-12-13T14:30:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:30:38.478656 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-12-13T14:30:38Z" level=info msg="torcx already run" Dec 13 14:30:38.557857 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:30:38.557876 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:30:38.582545 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:30:38.631000 audit: BPF prog-id=27 op=LOAD Dec 13 14:30:38.631000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:30:38.631000 audit: BPF prog-id=28 op=LOAD Dec 13 14:30:38.631000 audit: BPF prog-id=29 op=LOAD Dec 13 14:30:38.631000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:30:38.631000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:30:38.632000 audit: BPF prog-id=30 op=LOAD Dec 13 14:30:38.632000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:30:38.632000 audit: BPF prog-id=31 op=LOAD Dec 13 14:30:38.632000 audit: BPF prog-id=32 op=LOAD Dec 13 14:30:38.632000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:30:38.632000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:30:38.634000 audit: BPF prog-id=33 op=LOAD Dec 13 14:30:38.634000 audit: BPF prog-id=34 op=LOAD Dec 13 14:30:38.634000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:30:38.634000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:30:38.635000 audit: BPF prog-id=35 op=LOAD Dec 13 14:30:38.635000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:30:38.637710 systemd[1]: Finished ldconfig.service. Dec 13 14:30:38.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.639446 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:30:38.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.642947 systemd[1]: Starting audit-rules.service... Dec 13 14:30:38.644629 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:30:38.647000 audit: BPF prog-id=36 op=LOAD Dec 13 14:30:38.646616 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:30:38.649115 systemd[1]: Starting systemd-resolved.service... Dec 13 14:30:38.649000 audit: BPF prog-id=37 op=LOAD Dec 13 14:30:38.651143 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:30:38.652970 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:30:38.654244 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:30:38.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.657010 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:30:38.657000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.660017 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.660335 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.661501 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:30:38.663338 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:30:38.665325 systemd[1]: Starting modprobe@loop.service... Dec 13 14:30:38.666117 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.666280 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:30:38.666414 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:30:38.666622 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.668222 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:30:38.668380 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:30:38.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.669814 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:30:38.669961 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:30:38.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.671301 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:30:38.671417 systemd[1]: Finished modprobe@loop.service. Dec 13 14:30:38.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.672852 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:30:38.672984 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.674182 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:30:38.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.675651 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:30:38.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.679140 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.679310 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.680594 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:30:38.682425 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:30:38.684415 systemd[1]: Starting modprobe@loop.service... Dec 13 14:30:38.685292 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.685435 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:30:38.686619 systemd[1]: Starting systemd-update-done.service... Dec 13 14:30:38.687645 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:30:38.687780 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.688738 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:30:38.689000 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:30:38.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.695670 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:30:38.695783 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:30:38.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.696000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:30:38.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:38.696000 audit[1170]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd09e6edc0 a2=420 a3=0 items=0 ppid=1142 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:38.696000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:30:38.697128 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:30:38.697606 augenrules[1170]: No rules Dec 13 14:30:38.697238 systemd[1]: Finished modprobe@loop.service. Dec 13 14:30:38.698655 systemd[1]: Finished audit-rules.service. Dec 13 14:30:38.699919 systemd[1]: Finished systemd-update-done.service. Dec 13 14:30:38.703643 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.703841 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.705044 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:30:38.707035 systemd[1]: Starting modprobe@drm.service... Dec 13 14:30:38.708836 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:30:38.710721 systemd[1]: Starting modprobe@loop.service... Dec 13 14:30:38.712679 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:30:38.712820 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:30:38.714095 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:30:38.715205 systemd-resolved[1148]: Positive Trust Anchors: Dec 13 14:30:38.715219 systemd-resolved[1148]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:30:38.715249 systemd-resolved[1148]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:30:38.715283 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:30:38.715405 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:30:38.716436 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:30:38.718143 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:30:38.718258 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:30:38.719632 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:30:38.719757 systemd[1]: Finished modprobe@drm.service. Dec 13 14:30:39.630241 systemd-timesyncd[1152]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:30:39.630261 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:30:39.630376 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:30:39.630612 systemd-timesyncd[1152]: Initial clock synchronization to Fri 2024-12-13 14:30:39.630160 UTC. Dec 13 14:30:39.631984 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:30:39.632144 systemd[1]: Finished modprobe@loop.service. Dec 13 14:30:39.633794 systemd-resolved[1148]: Defaulting to hostname 'linux'. Dec 13 14:30:39.635072 systemd[1]: Finished ensure-sysext.service. Dec 13 14:30:39.636085 systemd[1]: Started systemd-resolved.service. Dec 13 14:30:39.637808 systemd[1]: Reached target network.target. Dec 13 14:30:39.638676 systemd[1]: Reached target nss-lookup.target. Dec 13 14:30:39.639569 systemd[1]: Reached target time-set.target. Dec 13 14:30:39.640444 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:30:39.640467 systemd[1]: Reached target sysinit.target. Dec 13 14:30:39.641556 systemd[1]: Started motdgen.path. Dec 13 14:30:39.642339 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:30:39.643654 systemd[1]: Started logrotate.timer. Dec 13 14:30:39.644535 systemd[1]: Started mdadm.timer. Dec 13 14:30:39.645292 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:30:39.646195 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:30:39.646221 systemd[1]: Reached target paths.target. Dec 13 14:30:39.647071 systemd[1]: Reached target timers.target. Dec 13 14:30:39.648240 systemd[1]: Listening on dbus.socket. Dec 13 14:30:39.650184 systemd[1]: Starting docker.socket... Dec 13 14:30:39.652830 systemd[1]: Listening on sshd.socket. Dec 13 14:30:39.653697 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:30:39.653734 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:30:39.654059 systemd[1]: Listening on docker.socket. Dec 13 14:30:39.655021 systemd[1]: Reached target sockets.target. Dec 13 14:30:39.655847 systemd[1]: Reached target basic.target. Dec 13 14:30:39.656678 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:30:39.656701 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:30:39.657418 systemd[1]: Starting containerd.service... Dec 13 14:30:39.658851 systemd[1]: Starting dbus.service... Dec 13 14:30:39.660736 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:30:39.662632 systemd[1]: Starting extend-filesystems.service... Dec 13 14:30:39.663824 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:30:39.664946 systemd[1]: Starting motdgen.service... Dec 13 14:30:39.665697 jq[1185]: false Dec 13 14:30:39.666762 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:30:39.668557 systemd[1]: Starting sshd-keygen.service... Dec 13 14:30:39.671367 systemd[1]: Starting systemd-logind.service... Dec 13 14:30:39.674162 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:30:39.674210 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:30:39.674580 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:30:39.675153 systemd[1]: Starting update-engine.service... Dec 13 14:30:39.677693 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:30:39.680850 jq[1202]: true Dec 13 14:30:39.680031 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:30:39.680230 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:30:39.680475 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:30:39.680628 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:30:39.689170 dbus-daemon[1184]: [system] SELinux support is enabled Dec 13 14:30:39.689335 systemd[1]: Started dbus.service. Dec 13 14:30:39.692595 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:30:39.694996 extend-filesystems[1186]: Found loop1 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found sr0 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda1 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda2 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda3 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found usr Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda4 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda6 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda7 Dec 13 14:30:39.694996 extend-filesystems[1186]: Found vda9 Dec 13 14:30:39.694996 extend-filesystems[1186]: Checking size of /dev/vda9 Dec 13 14:30:39.710249 jq[1205]: true Dec 13 14:30:39.692625 systemd[1]: Reached target system-config.target. Dec 13 14:30:39.695043 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:30:39.695087 systemd[1]: Reached target user-config.target. Dec 13 14:30:39.703305 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:30:39.704871 systemd[1]: Finished motdgen.service. Dec 13 14:30:39.715581 update_engine[1197]: I1213 14:30:39.714928 1197 main.cc:92] Flatcar Update Engine starting Dec 13 14:30:39.717263 extend-filesystems[1186]: Resized partition /dev/vda9 Dec 13 14:30:39.718318 update_engine[1197]: I1213 14:30:39.718108 1197 update_check_scheduler.cc:74] Next update check in 9m21s Dec 13 14:30:39.718334 systemd[1]: Started update-engine.service. Dec 13 14:30:39.722313 env[1206]: time="2024-12-13T14:30:39.722274132Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:30:39.722951 systemd[1]: Started locksmithd.service. Dec 13 14:30:39.726533 extend-filesystems[1226]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:30:39.743524 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:30:39.744725 bash[1234]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:30:39.745419 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:30:39.753720 systemd-logind[1191]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:30:39.753742 systemd-logind[1191]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:30:39.753952 systemd-logind[1191]: New seat seat0. Dec 13 14:30:39.755452 systemd[1]: Started systemd-logind.service. Dec 13 14:30:39.765529 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:30:39.766700 env[1206]: time="2024-12-13T14:30:39.766665341Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:30:39.784136 extend-filesystems[1226]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:30:39.784136 extend-filesystems[1226]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:30:39.784136 extend-filesystems[1226]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:30:39.788907 env[1206]: time="2024-12-13T14:30:39.783980593Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:30:39.784714 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:30:39.788991 extend-filesystems[1186]: Resized filesystem in /dev/vda9 Dec 13 14:30:39.784860 systemd[1]: Finished extend-filesystems.service. Dec 13 14:30:39.791591 env[1206]: time="2024-12-13T14:30:39.791192558Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791591 env[1206]: time="2024-12-13T14:30:39.791216323Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791591 env[1206]: time="2024-12-13T14:30:39.791386713Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791591 env[1206]: time="2024-12-13T14:30:39.791399046Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791591 env[1206]: time="2024-12-13T14:30:39.791409155Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:30:39.791591 env[1206]: time="2024-12-13T14:30:39.791417510Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791591 env[1206]: time="2024-12-13T14:30:39.791470670Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791833 env[1206]: time="2024-12-13T14:30:39.791660917Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791833 env[1206]: time="2024-12-13T14:30:39.791756927Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:30:39.791833 env[1206]: time="2024-12-13T14:30:39.791768589Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:30:39.791833 env[1206]: time="2024-12-13T14:30:39.791805638Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:30:39.791833 env[1206]: time="2024-12-13T14:30:39.791815717Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:30:39.792060 systemd[1]: Created slice system-sshd.slice. Dec 13 14:30:39.796765 locksmithd[1230]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:30:39.797085 env[1206]: time="2024-12-13T14:30:39.797035416Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:30:39.797085 env[1206]: time="2024-12-13T14:30:39.797079879Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:30:39.797156 env[1206]: time="2024-12-13T14:30:39.797093294Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:30:39.797156 env[1206]: time="2024-12-13T14:30:39.797129683Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797156 env[1206]: time="2024-12-13T14:30:39.797145242Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797233 env[1206]: time="2024-12-13T14:30:39.797157916Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797233 env[1206]: time="2024-12-13T14:30:39.797169648Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797233 env[1206]: time="2024-12-13T14:30:39.797182382Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797233 env[1206]: time="2024-12-13T14:30:39.797194114Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797233 env[1206]: time="2024-12-13T14:30:39.797206066Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797233 env[1206]: time="2024-12-13T14:30:39.797218389Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797233 env[1206]: time="2024-12-13T14:30:39.797229259Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:30:39.797365 env[1206]: time="2024-12-13T14:30:39.797310893Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:30:39.797387 env[1206]: time="2024-12-13T14:30:39.797374331Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:30:39.797605 env[1206]: time="2024-12-13T14:30:39.797582943Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:30:39.797641 env[1206]: time="2024-12-13T14:30:39.797608541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797641 env[1206]: time="2024-12-13T14:30:39.797620533Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:30:39.797685 env[1206]: time="2024-12-13T14:30:39.797659917Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797685 env[1206]: time="2024-12-13T14:30:39.797671168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797724 env[1206]: time="2024-12-13T14:30:39.797692308Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797724 env[1206]: time="2024-12-13T14:30:39.797703198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797724 env[1206]: time="2024-12-13T14:30:39.797713888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797786 env[1206]: time="2024-12-13T14:30:39.797725861Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797786 env[1206]: time="2024-12-13T14:30:39.797736551Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797786 env[1206]: time="2024-12-13T14:30:39.797746389Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797786 env[1206]: time="2024-12-13T14:30:39.797757901Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:30:39.797869 env[1206]: time="2024-12-13T14:30:39.797847248Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797869 env[1206]: time="2024-12-13T14:30:39.797859832Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797909 env[1206]: time="2024-12-13T14:30:39.797869801Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.797909 env[1206]: time="2024-12-13T14:30:39.797880691Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:30:39.797909 env[1206]: time="2024-12-13T14:30:39.797892854Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:30:39.797909 env[1206]: time="2024-12-13T14:30:39.797902312Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:30:39.797988 env[1206]: time="2024-12-13T14:30:39.797920656Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:30:39.797988 env[1206]: time="2024-12-13T14:30:39.797951744Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:30:39.798178 env[1206]: time="2024-12-13T14:30:39.798124839Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:30:39.798178 env[1206]: time="2024-12-13T14:30:39.798176055Z" level=info msg="Connect containerd service" Dec 13 14:30:39.798742 env[1206]: time="2024-12-13T14:30:39.798205130Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:30:39.798742 env[1206]: time="2024-12-13T14:30:39.798632822Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:30:39.798879 env[1206]: time="2024-12-13T14:30:39.798862492Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:30:39.798904 env[1206]: time="2024-12-13T14:30:39.798897508Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:30:39.798945 env[1206]: time="2024-12-13T14:30:39.798933345Z" level=info msg="containerd successfully booted in 0.077267s" Dec 13 14:30:39.798984 systemd[1]: Started containerd.service. Dec 13 14:30:39.802858 env[1206]: time="2024-12-13T14:30:39.802808072Z" level=info msg="Start subscribing containerd event" Dec 13 14:30:39.802858 env[1206]: time="2024-12-13T14:30:39.802854910Z" level=info msg="Start recovering state" Dec 13 14:30:39.802948 env[1206]: time="2024-12-13T14:30:39.802906246Z" level=info msg="Start event monitor" Dec 13 14:30:39.802948 env[1206]: time="2024-12-13T14:30:39.802915413Z" level=info msg="Start snapshots syncer" Dec 13 14:30:39.802948 env[1206]: time="2024-12-13T14:30:39.802923248Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:30:39.802948 env[1206]: time="2024-12-13T14:30:39.802932876Z" level=info msg="Start streaming server" Dec 13 14:30:40.698638 systemd-networkd[1038]: eth0: Gained IPv6LL Dec 13 14:30:40.700280 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:30:40.701596 systemd[1]: Reached target network-online.target. Dec 13 14:30:40.703731 systemd[1]: Starting kubelet.service... Dec 13 14:30:40.862068 sshd_keygen[1204]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:30:40.879955 systemd[1]: Finished sshd-keygen.service. Dec 13 14:30:40.882226 systemd[1]: Starting issuegen.service... Dec 13 14:30:40.883821 systemd[1]: Started sshd@0-10.0.0.141:22-10.0.0.1:53962.service. Dec 13 14:30:40.886555 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:30:40.886734 systemd[1]: Finished issuegen.service. Dec 13 14:30:40.888920 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:30:40.894323 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:30:40.896800 systemd[1]: Started getty@tty1.service. Dec 13 14:30:40.898701 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:30:40.899885 systemd[1]: Reached target getty.target. Dec 13 14:30:40.922990 sshd[1258]: Accepted publickey for core from 10.0.0.1 port 53962 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:40.924441 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:40.932815 systemd-logind[1191]: New session 1 of user core. Dec 13 14:30:40.933717 systemd[1]: Created slice user-500.slice. Dec 13 14:30:40.935744 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:30:40.944786 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:30:40.947026 systemd[1]: Starting user@500.service... Dec 13 14:30:40.949444 (systemd)[1266]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:41.013377 systemd[1266]: Queued start job for default target default.target. Dec 13 14:30:41.013795 systemd[1266]: Reached target paths.target. Dec 13 14:30:41.013815 systemd[1266]: Reached target sockets.target. Dec 13 14:30:41.013826 systemd[1266]: Reached target timers.target. Dec 13 14:30:41.013836 systemd[1266]: Reached target basic.target. Dec 13 14:30:41.013871 systemd[1266]: Reached target default.target. Dec 13 14:30:41.013891 systemd[1266]: Startup finished in 58ms. Dec 13 14:30:41.013975 systemd[1]: Started user@500.service. Dec 13 14:30:41.015985 systemd[1]: Started session-1.scope. Dec 13 14:30:41.066164 systemd[1]: Started sshd@1-10.0.0.141:22-10.0.0.1:44362.service. Dec 13 14:30:41.103783 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 44362 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:41.104948 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:41.108641 systemd-logind[1191]: New session 2 of user core. Dec 13 14:30:41.109416 systemd[1]: Started session-2.scope. Dec 13 14:30:41.164382 sshd[1275]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:41.167549 systemd[1]: Started sshd@2-10.0.0.141:22-10.0.0.1:44374.service. Dec 13 14:30:41.169474 systemd[1]: sshd@1-10.0.0.141:22-10.0.0.1:44362.service: Deactivated successfully. Dec 13 14:30:41.170309 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:30:41.170939 systemd-logind[1191]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:30:41.171983 systemd-logind[1191]: Removed session 2. Dec 13 14:30:41.202103 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 44374 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:41.203296 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:41.206718 systemd-logind[1191]: New session 3 of user core. Dec 13 14:30:41.207531 systemd[1]: Started session-3.scope. Dec 13 14:30:41.260512 sshd[1280]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:41.262751 systemd[1]: sshd@2-10.0.0.141:22-10.0.0.1:44374.service: Deactivated successfully. Dec 13 14:30:41.263358 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:30:41.263977 systemd-logind[1191]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:30:41.264769 systemd-logind[1191]: Removed session 3. Dec 13 14:30:41.300089 systemd[1]: Started kubelet.service. Dec 13 14:30:41.301306 systemd[1]: Reached target multi-user.target. Dec 13 14:30:41.303221 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:30:41.310106 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:30:41.310303 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:30:41.311532 systemd[1]: Startup finished in 641ms (kernel) + 4.147s (initrd) + 5.553s (userspace) = 10.343s. Dec 13 14:30:41.712130 kubelet[1288]: E1213 14:30:41.712073 1288 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:30:41.713765 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:30:41.713890 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:30:51.264114 systemd[1]: Started sshd@3-10.0.0.141:22-10.0.0.1:55632.service. Dec 13 14:30:51.299453 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 55632 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:51.300624 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:51.303728 systemd-logind[1191]: New session 4 of user core. Dec 13 14:30:51.304314 systemd[1]: Started session-4.scope. Dec 13 14:30:51.358584 sshd[1297]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:51.361188 systemd[1]: sshd@3-10.0.0.141:22-10.0.0.1:55632.service: Deactivated successfully. Dec 13 14:30:51.361666 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:30:51.362188 systemd-logind[1191]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:30:51.363091 systemd[1]: Started sshd@4-10.0.0.141:22-10.0.0.1:55646.service. Dec 13 14:30:51.363909 systemd-logind[1191]: Removed session 4. Dec 13 14:30:51.397472 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 55646 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:51.398617 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:51.402209 systemd-logind[1191]: New session 5 of user core. Dec 13 14:30:51.403361 systemd[1]: Started session-5.scope. Dec 13 14:30:51.453912 sshd[1303]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:51.457123 systemd[1]: sshd@4-10.0.0.141:22-10.0.0.1:55646.service: Deactivated successfully. Dec 13 14:30:51.457847 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:30:51.458470 systemd-logind[1191]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:30:51.459743 systemd[1]: Started sshd@5-10.0.0.141:22-10.0.0.1:55656.service. Dec 13 14:30:51.460444 systemd-logind[1191]: Removed session 5. Dec 13 14:30:51.492810 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 55656 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:51.494012 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:51.497964 systemd-logind[1191]: New session 6 of user core. Dec 13 14:30:51.499064 systemd[1]: Started session-6.scope. Dec 13 14:30:51.552384 sshd[1309]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:51.555185 systemd[1]: sshd@5-10.0.0.141:22-10.0.0.1:55656.service: Deactivated successfully. Dec 13 14:30:51.555649 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:30:51.556109 systemd-logind[1191]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:30:51.556978 systemd[1]: Started sshd@6-10.0.0.141:22-10.0.0.1:55660.service. Dec 13 14:30:51.557545 systemd-logind[1191]: Removed session 6. Dec 13 14:30:51.592892 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 55660 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:51.593874 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:51.597020 systemd-logind[1191]: New session 7 of user core. Dec 13 14:30:51.597750 systemd[1]: Started session-7.scope. Dec 13 14:30:51.652695 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:30:51.652891 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:30:51.666691 dbus-daemon[1184]: \xd0-\xd7\xe6sU: received setenforce notice (enforcing=475033968) Dec 13 14:30:51.668760 sudo[1319]: pam_unix(sudo:session): session closed for user root Dec 13 14:30:51.670220 sshd[1315]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:51.672850 systemd[1]: sshd@6-10.0.0.141:22-10.0.0.1:55660.service: Deactivated successfully. Dec 13 14:30:51.673335 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:30:51.673767 systemd-logind[1191]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:30:51.674688 systemd[1]: Started sshd@7-10.0.0.141:22-10.0.0.1:55662.service. Dec 13 14:30:51.675305 systemd-logind[1191]: Removed session 7. Dec 13 14:30:51.708297 sshd[1323]: Accepted publickey for core from 10.0.0.1 port 55662 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:51.709367 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:51.712549 systemd-logind[1191]: New session 8 of user core. Dec 13 14:30:51.713369 systemd[1]: Started session-8.scope. Dec 13 14:30:51.714633 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:30:51.714845 systemd[1]: Stopped kubelet.service. Dec 13 14:30:51.715920 systemd[1]: Starting kubelet.service... Dec 13 14:30:51.768459 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:30:51.768663 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:30:51.771599 sudo[1329]: pam_unix(sudo:session): session closed for user root Dec 13 14:30:51.776356 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:30:51.776573 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:30:51.786122 systemd[1]: Stopping audit-rules.service... Dec 13 14:30:51.787000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:30:51.788551 kernel: kauditd_printk_skb: 222 callbacks suppressed Dec 13 14:30:51.788675 kernel: audit: type=1305 audit(1734100251.787:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:30:51.788703 auditctl[1332]: No rules Dec 13 14:30:51.787000 audit[1332]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd51ba55b0 a2=420 a3=0 items=0 ppid=1 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:51.792689 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:30:51.792905 systemd[1]: Stopped audit-rules.service. Dec 13 14:30:51.796025 kernel: audit: type=1300 audit(1734100251.787:200): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd51ba55b0 a2=420 a3=0 items=0 ppid=1 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:51.796076 kernel: audit: type=1327 audit(1734100251.787:200): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:30:51.787000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:30:51.794426 systemd[1]: Starting audit-rules.service... Dec 13 14:30:51.796671 kernel: audit: type=1131 audit(1734100251.792:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.797260 systemd[1]: Started kubelet.service. Dec 13 14:30:51.801058 kernel: audit: type=1130 audit(1734100251.796:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.812045 augenrules[1357]: No rules Dec 13 14:30:51.812510 systemd[1]: Finished audit-rules.service. Dec 13 14:30:51.819543 kernel: audit: type=1130 audit(1734100251.812:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.819634 kernel: audit: type=1106 audit(1734100251.815:204): pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.815000 audit[1328]: USER_END pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.816326 sudo[1328]: pam_unix(sudo:session): session closed for user root Dec 13 14:30:51.821182 sshd[1323]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:51.815000 audit[1328]: CRED_DISP pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.824791 systemd[1]: sshd@7-10.0.0.141:22-10.0.0.1:55662.service: Deactivated successfully. Dec 13 14:30:51.829513 kernel: audit: type=1104 audit(1734100251.815:205): pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.829575 kernel: audit: type=1106 audit(1734100251.821:206): pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.821000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.825265 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:30:51.826209 systemd-logind[1191]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:30:51.827070 systemd[1]: Started sshd@8-10.0.0.141:22-10.0.0.1:55666.service. Dec 13 14:30:51.828446 systemd-logind[1191]: Removed session 8. Dec 13 14:30:51.821000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.141:22-10.0.0.1:55662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.141:22-10.0.0.1:55666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.833520 kernel: audit: type=1104 audit(1734100251.821:207): pid=1323 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.844706 kubelet[1338]: E1213 14:30:51.844661 1338 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:30:51.847077 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:30:51.847190 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:30:51.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:51.862000 audit[1364]: USER_ACCT pid=1364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.863278 sshd[1364]: Accepted publickey for core from 10.0.0.1 port 55666 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:51.863000 audit[1364]: CRED_ACQ pid=1364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.863000 audit[1364]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff58cbbd10 a2=3 a3=0 items=0 ppid=1 pid=1364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:51.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:30:51.864364 sshd[1364]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:51.867606 systemd-logind[1191]: New session 9 of user core. Dec 13 14:30:51.868313 systemd[1]: Started session-9.scope. Dec 13 14:30:51.871000 audit[1364]: USER_START pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.872000 audit[1366]: CRED_ACQ pid=1366 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:51.918000 audit[1367]: USER_ACCT pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.919109 sudo[1367]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:30:51.918000 audit[1367]: CRED_REFR pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.919291 sudo[1367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:30:51.920000 audit[1367]: USER_START pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.929924 systemd[1]: Starting coreos-metadata.service... Dec 13 14:30:51.936354 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 14:30:51.936474 systemd[1]: Finished coreos-metadata.service. Dec 13 14:30:51.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:51.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.337785 systemd[1]: Stopped kubelet.service. Dec 13 14:30:52.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.340052 systemd[1]: Starting kubelet.service... Dec 13 14:30:52.363573 systemd[1]: Reloading. Dec 13 14:30:52.426752 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-12-13T14:30:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:30:52.427035 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-12-13T14:30:52Z" level=info msg="torcx already run" Dec 13 14:30:53.100672 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:30:53.100688 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:30:53.118086 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit: BPF prog-id=43 op=LOAD Dec 13 14:30:53.177000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit: BPF prog-id=44 op=LOAD Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit: BPF prog-id=45 op=LOAD Dec 13 14:30:53.177000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:30:53.177000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit: BPF prog-id=46 op=LOAD Dec 13 14:30:53.178000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit: BPF prog-id=47 op=LOAD Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit: BPF prog-id=48 op=LOAD Dec 13 14:30:53.178000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:30:53.178000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.179000 audit: BPF prog-id=49 op=LOAD Dec 13 14:30:53.179000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit: BPF prog-id=50 op=LOAD Dec 13 14:30:53.180000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit: BPF prog-id=51 op=LOAD Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.180000 audit: BPF prog-id=52 op=LOAD Dec 13 14:30:53.180000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:30:53.180000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.181000 audit: BPF prog-id=53 op=LOAD Dec 13 14:30:53.181000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.182000 audit: BPF prog-id=54 op=LOAD Dec 13 14:30:53.182000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit: BPF prog-id=55 op=LOAD Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit: BPF prog-id=56 op=LOAD Dec 13 14:30:53.185000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:30:53.185000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.185000 audit: BPF prog-id=57 op=LOAD Dec 13 14:30:53.185000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:30:53.195039 systemd[1]: Started kubelet.service. Dec 13 14:30:53.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:53.196039 systemd[1]: Stopping kubelet.service... Dec 13 14:30:53.196254 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:30:53.196387 systemd[1]: Stopped kubelet.service. Dec 13 14:30:53.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:53.197451 systemd[1]: Starting kubelet.service... Dec 13 14:30:53.267848 systemd[1]: Started kubelet.service. Dec 13 14:30:53.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:53.299444 kubelet[1471]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:53.299444 kubelet[1471]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:30:53.299444 kubelet[1471]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:53.299800 kubelet[1471]: I1213 14:30:53.299485 1471 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:30:53.493791 kubelet[1471]: I1213 14:30:53.493687 1471 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:30:53.493791 kubelet[1471]: I1213 14:30:53.493713 1471 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:30:53.494077 kubelet[1471]: I1213 14:30:53.493954 1471 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:30:53.508930 kubelet[1471]: I1213 14:30:53.508769 1471 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:30:53.519984 kubelet[1471]: E1213 14:30:53.519936 1471 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:30:53.519984 kubelet[1471]: I1213 14:30:53.519976 1471 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:30:53.525145 kubelet[1471]: I1213 14:30:53.525097 1471 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:30:53.525308 kubelet[1471]: I1213 14:30:53.525220 1471 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:30:53.525397 kubelet[1471]: I1213 14:30:53.525362 1471 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:30:53.525588 kubelet[1471]: I1213 14:30:53.525392 1471 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.141","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:30:53.525712 kubelet[1471]: I1213 14:30:53.525597 1471 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:30:53.525712 kubelet[1471]: I1213 14:30:53.525607 1471 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:30:53.525712 kubelet[1471]: I1213 14:30:53.525711 1471 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:53.529845 kubelet[1471]: I1213 14:30:53.529804 1471 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:30:53.529845 kubelet[1471]: I1213 14:30:53.529834 1471 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:30:53.530050 kubelet[1471]: I1213 14:30:53.529867 1471 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:30:53.530050 kubelet[1471]: I1213 14:30:53.529880 1471 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:30:53.530050 kubelet[1471]: E1213 14:30:53.529945 1471 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:30:53.530050 kubelet[1471]: E1213 14:30:53.529995 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:30:53.550950 kubelet[1471]: I1213 14:30:53.550922 1471 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:30:53.552571 kubelet[1471]: I1213 14:30:53.552557 1471 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:30:53.552642 kubelet[1471]: W1213 14:30:53.552621 1471 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:30:53.553154 kubelet[1471]: I1213 14:30:53.553138 1471 server.go:1269] "Started kubelet" Dec 13 14:30:53.553235 kubelet[1471]: I1213 14:30:53.553189 1471 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:30:53.559352 kubelet[1471]: I1213 14:30:53.559330 1471 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:30:53.560009 kubelet[1471]: I1213 14:30:53.559969 1471 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:30:53.560194 kubelet[1471]: I1213 14:30:53.560170 1471 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:30:53.560400 kubelet[1471]: W1213 14:30:53.560376 1471 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:30:53.560450 kubelet[1471]: E1213 14:30:53.560404 1471 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:30:53.560509 kubelet[1471]: W1213 14:30:53.560483 1471 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.141" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:30:53.560536 kubelet[1471]: E1213 14:30:53.560511 1471 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.141\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 14:30:53.571687 kubelet[1471]: E1213 14:30:53.571668 1471 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:30:53.571000 audit[1471]: AVC avc: denied { mac_admin } for pid=1471 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:53.571000 audit[1471]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00062bb30 a1=c0004e5e78 a2=c00062bb00 a3=25 items=0 ppid=1 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:53.571000 audit[1471]: AVC avc: denied { mac_admin } for pid=1471 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:53.571000 audit[1471]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00088b380 a1=c0004e5e90 a2=c00062bbc0 a3=25 items=0 ppid=1 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:53.572461 kubelet[1471]: I1213 14:30:53.572062 1471 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:30:53.572461 kubelet[1471]: I1213 14:30:53.572095 1471 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:30:53.572461 kubelet[1471]: I1213 14:30:53.572146 1471 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:30:53.572461 kubelet[1471]: I1213 14:30:53.572218 1471 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:30:53.572577 kubelet[1471]: I1213 14:30:53.572564 1471 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:30:53.572673 kubelet[1471]: I1213 14:30:53.572660 1471 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:30:53.572743 kubelet[1471]: I1213 14:30:53.572719 1471 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:30:53.573046 kubelet[1471]: I1213 14:30:53.572974 1471 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:30:53.573046 kubelet[1471]: I1213 14:30:53.573037 1471 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:30:53.573490 kubelet[1471]: E1213 14:30:53.573472 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:53.574276 kubelet[1471]: I1213 14:30:53.574259 1471 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:30:53.577991 kubelet[1471]: W1213 14:30:53.577964 1471 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:30:53.578128 kubelet[1471]: E1213 14:30:53.578105 1471 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Dec 13 14:30:53.579191 kubelet[1471]: E1213 14:30:53.578241 1471 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.141.1810c2fe31f2b0e4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.141,UID:10.0.0.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.141,},FirstTimestamp:2024-12-13 14:30:53.553111268 +0000 UTC m=+0.282010711,LastTimestamp:2024-12-13 14:30:53.553111268 +0000 UTC m=+0.282010711,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.141,}" Dec 13 14:30:53.579640 kubelet[1471]: E1213 14:30:53.579621 1471 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.141\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:30:53.585085 kubelet[1471]: E1213 14:30:53.584987 1471 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.141.1810c2fe330d8708 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.141,UID:10.0.0.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.141,},FirstTimestamp:2024-12-13 14:30:53.57164724 +0000 UTC m=+0.300546683,LastTimestamp:2024-12-13 14:30:53.57164724 +0000 UTC m=+0.300546683,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.141,}" Dec 13 14:30:53.586700 kubelet[1471]: I1213 14:30:53.586687 1471 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:30:53.586827 kubelet[1471]: I1213 14:30:53.586803 1471 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:30:53.586827 kubelet[1471]: I1213 14:30:53.586833 1471 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:53.589930 kubelet[1471]: E1213 14:30:53.589803 1471 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.141.1810c2fe33e57b0f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.141,UID:10.0.0.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.0.0.141 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.0.0.141,},FirstTimestamp:2024-12-13 14:30:53.585799951 +0000 UTC m=+0.314699394,LastTimestamp:2024-12-13 14:30:53.585799951 +0000 UTC m=+0.314699394,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.141,}" Dec 13 14:30:53.593525 kubelet[1471]: E1213 14:30:53.593424 1471 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.141.1810c2fe33e5ab79 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.141,UID:10.0.0.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.141 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.141,},FirstTimestamp:2024-12-13 14:30:53.585812345 +0000 UTC m=+0.314711788,LastTimestamp:2024-12-13 14:30:53.585812345 +0000 UTC m=+0.314711788,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.141,}" Dec 13 14:30:53.596787 kubelet[1471]: E1213 14:30:53.596712 1471 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.141.1810c2fe33e5bb2a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.141,UID:10.0.0.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.0.0.141 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.0.0.141,},FirstTimestamp:2024-12-13 14:30:53.585816362 +0000 UTC m=+0.314715795,LastTimestamp:2024-12-13 14:30:53.585816362 +0000 UTC m=+0.314715795,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.141,}" Dec 13 14:30:53.601000 audit[1487]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:53.601000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe932b6170 a2=0 a3=7ffe932b615c items=0 ppid=1471 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:30:53.602000 audit[1492]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:53.602000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd98557fc0 a2=0 a3=7ffd98557fac items=0 ppid=1471 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:30:53.674546 kubelet[1471]: E1213 14:30:53.674481 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:53.774919 kubelet[1471]: E1213 14:30:53.774794 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:53.788401 kubelet[1471]: E1213 14:30:53.788360 1471 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.141\" not found" node="10.0.0.141" Dec 13 14:30:53.875694 kubelet[1471]: E1213 14:30:53.875667 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:53.976197 kubelet[1471]: E1213 14:30:53.976160 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:54.076967 kubelet[1471]: E1213 14:30:54.076944 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:53.604000 audit[1494]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:53.604000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc415a12b0 a2=0 a3=7ffc415a129c items=0 ppid=1471 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:54.085000 audit[1499]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:54.085000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe810e8530 a2=0 a3=7ffe810e851c items=0 ppid=1471 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:54.117000 audit[1504]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:54.117000 audit[1504]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffccd9a4780 a2=0 a3=7ffccd9a476c items=0 ppid=1471 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:30:54.118482 kubelet[1471]: I1213 14:30:54.118457 1471 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:30:54.118000 audit[1505]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:54.118000 audit[1505]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe3dd953d0 a2=0 a3=7ffe3dd953bc items=0 ppid=1471 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:30:54.118000 audit[1506]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:54.118000 audit[1506]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc7ab97e0 a2=0 a3=7fffc7ab97cc items=0 ppid=1471 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:30:54.119545 kubelet[1471]: I1213 14:30:54.119384 1471 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:30:54.119545 kubelet[1471]: I1213 14:30:54.119413 1471 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:30:54.119545 kubelet[1471]: I1213 14:30:54.119431 1471 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:30:54.119652 kubelet[1471]: E1213 14:30:54.119558 1471 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:30:54.119000 audit[1507]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1507 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:54.119000 audit[1507]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea5a0f920 a2=0 a3=7ffea5a0f90c items=0 ppid=1471 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:30:54.120000 audit[1508]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:54.120000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffffb4aff50 a2=0 a3=7ffffb4aff3c items=0 ppid=1471 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:30:54.120000 audit[1509]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:54.120000 audit[1509]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd8e0c1b30 a2=0 a3=7ffd8e0c1b1c items=0 ppid=1471 pid=1509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:30:54.121000 audit[1510]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1510 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:54.121000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7f2b6fc0 a2=0 a3=7ffc7f2b6fac items=0 ppid=1471 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:30:54.121000 audit[1511]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1511 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:54.121000 audit[1511]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc81960e30 a2=0 a3=7ffc81960e1c items=0 ppid=1471 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:30:54.126355 kubelet[1471]: I1213 14:30:54.126335 1471 policy_none.go:49] "None policy: Start" Dec 13 14:30:54.126989 kubelet[1471]: I1213 14:30:54.126961 1471 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:30:54.127054 kubelet[1471]: I1213 14:30:54.127005 1471 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:30:54.153473 systemd[1]: Created slice kubepods.slice. Dec 13 14:30:54.157420 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:30:54.159946 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:30:54.165124 kubelet[1471]: I1213 14:30:54.165084 1471 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:30:54.164000 audit[1471]: AVC avc: denied { mac_admin } for pid=1471 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.164000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:54.164000 audit[1471]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b37890 a1=c000abfe60 a2=c000b37860 a3=25 items=0 ppid=1 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:54.165447 kubelet[1471]: I1213 14:30:54.165150 1471 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:30:54.165447 kubelet[1471]: I1213 14:30:54.165235 1471 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:30:54.165447 kubelet[1471]: I1213 14:30:54.165245 1471 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:30:54.165447 kubelet[1471]: I1213 14:30:54.165403 1471 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:30:54.168431 kubelet[1471]: E1213 14:30:54.168386 1471 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.141\" not found" Dec 13 14:30:54.266030 kubelet[1471]: I1213 14:30:54.266005 1471 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.141" Dec 13 14:30:54.274031 kubelet[1471]: I1213 14:30:54.274005 1471 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.141" Dec 13 14:30:54.274031 kubelet[1471]: E1213 14:30:54.274027 1471 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.0.0.141\": node \"10.0.0.141\" not found" Dec 13 14:30:54.285635 kubelet[1471]: E1213 14:30:54.285613 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:54.293087 sudo[1367]: pam_unix(sudo:session): session closed for user root Dec 13 14:30:54.292000 audit[1367]: USER_END pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.292000 audit[1367]: CRED_DISP pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.294467 sshd[1364]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:54.294000 audit[1364]: USER_END pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.294000 audit[1364]: CRED_DISP pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.296851 systemd[1]: sshd@8-10.0.0.141:22-10.0.0.1:55666.service: Deactivated successfully. Dec 13 14:30:54.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.141:22-10.0.0.1:55666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.297540 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:30:54.298089 systemd-logind[1191]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:30:54.298798 systemd-logind[1191]: Removed session 9. Dec 13 14:30:54.386169 kubelet[1471]: E1213 14:30:54.386046 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:54.486693 kubelet[1471]: E1213 14:30:54.486632 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:54.495869 kubelet[1471]: I1213 14:30:54.495827 1471 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:30:54.495992 kubelet[1471]: W1213 14:30:54.495969 1471 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:30:54.530330 kubelet[1471]: E1213 14:30:54.530271 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:30:54.587640 kubelet[1471]: E1213 14:30:54.587607 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:54.688628 kubelet[1471]: E1213 14:30:54.688471 1471 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.141\" not found" Dec 13 14:30:54.789420 kubelet[1471]: I1213 14:30:54.789393 1471 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:30:54.789748 env[1206]: time="2024-12-13T14:30:54.789692229Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:30:54.790001 kubelet[1471]: I1213 14:30:54.789979 1471 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:30:55.530790 kubelet[1471]: E1213 14:30:55.530743 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:30:55.530790 kubelet[1471]: I1213 14:30:55.530773 1471 apiserver.go:52] "Watching apiserver" Dec 13 14:30:55.534707 kubelet[1471]: E1213 14:30:55.534670 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:30:55.539629 systemd[1]: Created slice kubepods-besteffort-podebfc6ec8_5534_4535_ab5f_6b36063d772b.slice. Dec 13 14:30:55.558525 systemd[1]: Created slice kubepods-besteffort-pod8121352e_9db3_4635_8b29_eab850389587.slice. Dec 13 14:30:55.573299 kubelet[1471]: I1213 14:30:55.573262 1471 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:30:55.582316 kubelet[1471]: I1213 14:30:55.582263 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8121352e-9db3-4635-8b29-eab850389587-lib-modules\") pod \"kube-proxy-hvcgb\" (UID: \"8121352e-9db3-4635-8b29-eab850389587\") " pod="kube-system/kube-proxy-hvcgb" Dec 13 14:30:55.582316 kubelet[1471]: I1213 14:30:55.582305 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ebfc6ec8-5534-4535-ab5f-6b36063d772b-tigera-ca-bundle\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582316 kubelet[1471]: I1213 14:30:55.582325 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-run-calico\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582577 kubelet[1471]: I1213 14:30:55.582341 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-log-dir\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582577 kubelet[1471]: I1213 14:30:55.582358 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-flexvol-driver-host\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582577 kubelet[1471]: I1213 14:30:55.582402 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vq4n9\" (UniqueName: \"kubernetes.io/projected/ebfc6ec8-5534-4535-ab5f-6b36063d772b-kube-api-access-vq4n9\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582577 kubelet[1471]: I1213 14:30:55.582432 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8121352e-9db3-4635-8b29-eab850389587-xtables-lock\") pod \"kube-proxy-hvcgb\" (UID: \"8121352e-9db3-4635-8b29-eab850389587\") " pod="kube-system/kube-proxy-hvcgb" Dec 13 14:30:55.582577 kubelet[1471]: I1213 14:30:55.582450 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x72sq\" (UniqueName: \"kubernetes.io/projected/8121352e-9db3-4635-8b29-eab850389587-kube-api-access-x72sq\") pod \"kube-proxy-hvcgb\" (UID: \"8121352e-9db3-4635-8b29-eab850389587\") " pod="kube-system/kube-proxy-hvcgb" Dec 13 14:30:55.582736 kubelet[1471]: I1213 14:30:55.582464 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-policysync\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582736 kubelet[1471]: I1213 14:30:55.582475 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/89cc47c1-7354-46a5-8a7c-c38f4a67c0a6-kubelet-dir\") pod \"csi-node-driver-zk2cr\" (UID: \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\") " pod="calico-system/csi-node-driver-zk2cr" Dec 13 14:30:55.582736 kubelet[1471]: I1213 14:30:55.582488 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/89cc47c1-7354-46a5-8a7c-c38f4a67c0a6-socket-dir\") pod \"csi-node-driver-zk2cr\" (UID: \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\") " pod="calico-system/csi-node-driver-zk2cr" Dec 13 14:30:55.582736 kubelet[1471]: I1213 14:30:55.582512 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/89cc47c1-7354-46a5-8a7c-c38f4a67c0a6-registration-dir\") pod \"csi-node-driver-zk2cr\" (UID: \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\") " pod="calico-system/csi-node-driver-zk2cr" Dec 13 14:30:55.582736 kubelet[1471]: I1213 14:30:55.582524 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-net-dir\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582884 kubelet[1471]: I1213 14:30:55.582537 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8121352e-9db3-4635-8b29-eab850389587-kube-proxy\") pod \"kube-proxy-hvcgb\" (UID: \"8121352e-9db3-4635-8b29-eab850389587\") " pod="kube-system/kube-proxy-hvcgb" Dec 13 14:30:55.582884 kubelet[1471]: I1213 14:30:55.582578 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-lib-modules\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582884 kubelet[1471]: I1213 14:30:55.582609 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-lib-calico\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582884 kubelet[1471]: I1213 14:30:55.582627 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/89cc47c1-7354-46a5-8a7c-c38f4a67c0a6-varrun\") pod \"csi-node-driver-zk2cr\" (UID: \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\") " pod="calico-system/csi-node-driver-zk2cr" Dec 13 14:30:55.582884 kubelet[1471]: I1213 14:30:55.582658 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rtcr5\" (UniqueName: \"kubernetes.io/projected/89cc47c1-7354-46a5-8a7c-c38f4a67c0a6-kube-api-access-rtcr5\") pod \"csi-node-driver-zk2cr\" (UID: \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\") " pod="calico-system/csi-node-driver-zk2cr" Dec 13 14:30:55.582998 kubelet[1471]: I1213 14:30:55.582677 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-xtables-lock\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582998 kubelet[1471]: I1213 14:30:55.582707 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ebfc6ec8-5534-4535-ab5f-6b36063d772b-node-certs\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.582998 kubelet[1471]: I1213 14:30:55.582766 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-bin-dir\") pod \"calico-node-hdvc8\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " pod="calico-system/calico-node-hdvc8" Dec 13 14:30:55.684059 kubelet[1471]: I1213 14:30:55.684028 1471 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:30:55.684749 kubelet[1471]: E1213 14:30:55.684720 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:55.684749 kubelet[1471]: W1213 14:30:55.684746 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:55.684861 kubelet[1471]: E1213 14:30:55.684766 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:55.686646 kubelet[1471]: E1213 14:30:55.686612 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:55.686646 kubelet[1471]: W1213 14:30:55.686630 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:55.686646 kubelet[1471]: E1213 14:30:55.686646 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:55.699058 kubelet[1471]: E1213 14:30:55.699022 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:55.699058 kubelet[1471]: W1213 14:30:55.699039 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:55.699058 kubelet[1471]: E1213 14:30:55.699056 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:55.699218 kubelet[1471]: E1213 14:30:55.699204 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:55.699218 kubelet[1471]: W1213 14:30:55.699210 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:55.699260 kubelet[1471]: E1213 14:30:55.699217 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:55.699342 kubelet[1471]: E1213 14:30:55.699319 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:55.699342 kubelet[1471]: W1213 14:30:55.699333 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:55.699342 kubelet[1471]: E1213 14:30:55.699339 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:55.858983 kubelet[1471]: E1213 14:30:55.858927 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:55.859660 env[1206]: time="2024-12-13T14:30:55.859627840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hdvc8,Uid:ebfc6ec8-5534-4535-ab5f-6b36063d772b,Namespace:calico-system,Attempt:0,}" Dec 13 14:30:55.860805 kubelet[1471]: E1213 14:30:55.860762 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:55.861116 env[1206]: time="2024-12-13T14:30:55.861090543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hvcgb,Uid:8121352e-9db3-4635-8b29-eab850389587,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:56.531091 kubelet[1471]: E1213 14:30:56.531043 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:30:56.546379 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3820213709.mount: Deactivated successfully. Dec 13 14:30:56.553028 env[1206]: time="2024-12-13T14:30:56.552975114Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.556011 env[1206]: time="2024-12-13T14:30:56.555977895Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.559649 env[1206]: time="2024-12-13T14:30:56.559611199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.562952 env[1206]: time="2024-12-13T14:30:56.562901069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.564229 env[1206]: time="2024-12-13T14:30:56.564198532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.565312 env[1206]: time="2024-12-13T14:30:56.565288887Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.567182 env[1206]: time="2024-12-13T14:30:56.567163763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.568057 env[1206]: time="2024-12-13T14:30:56.568028064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:56.591241 env[1206]: time="2024-12-13T14:30:56.591164623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:56.591448 env[1206]: time="2024-12-13T14:30:56.591216520Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:56.591448 env[1206]: time="2024-12-13T14:30:56.591227120Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:56.591448 env[1206]: time="2024-12-13T14:30:56.591409081Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/daebeafb9e14426a83aab7cadf10b4d7b64d0e8011ddf96ea49e680ecd69a4a1 pid=1532 runtime=io.containerd.runc.v2 Dec 13 14:30:56.594037 env[1206]: time="2024-12-13T14:30:56.593989350Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:56.594108 env[1206]: time="2024-12-13T14:30:56.594023925Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:56.594108 env[1206]: time="2024-12-13T14:30:56.594034545Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:56.594191 env[1206]: time="2024-12-13T14:30:56.594147807Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b pid=1549 runtime=io.containerd.runc.v2 Dec 13 14:30:56.601223 systemd[1]: Started cri-containerd-daebeafb9e14426a83aab7cadf10b4d7b64d0e8011ddf96ea49e680ecd69a4a1.scope. Dec 13 14:30:56.604435 systemd[1]: Started cri-containerd-b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b.scope. Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.614000 audit: BPF prog-id=58 op=LOAD Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1532 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656265616662396531343432366138336161623763616466313062 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1532 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656265616662396531343432366138336161623763616466313062 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit: BPF prog-id=59 op=LOAD Dec 13 14:30:56.615000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038cfc0 items=0 ppid=1532 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656265616662396531343432366138336161623763616466313062 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit: BPF prog-id=60 op=LOAD Dec 13 14:30:56.615000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038d008 items=0 ppid=1532 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656265616662396531343432366138336161623763616466313062 Dec 13 14:30:56.615000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:30:56.615000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { perfmon } for pid=1553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1553]: AVC avc: denied { bpf } for pid=1553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit: BPF prog-id=61 op=LOAD Dec 13 14:30:56.615000 audit[1553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038d418 items=0 ppid=1532 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656265616662396531343432366138336161623763616466313062 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.615000 audit: BPF prog-id=62 op=LOAD Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1549 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663335393266656566393132316634626463326466636634393435 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1549 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663335393266656566393132316634626463326466636634393435 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit: BPF prog-id=63 op=LOAD Dec 13 14:30:56.616000 audit[1566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002aab80 items=0 ppid=1549 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663335393266656566393132316634626463326466636634393435 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit: BPF prog-id=64 op=LOAD Dec 13 14:30:56.616000 audit[1566]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002aabc8 items=0 ppid=1549 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663335393266656566393132316634626463326466636634393435 Dec 13 14:30:56.616000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:30:56.616000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { perfmon } for pid=1566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit[1566]: AVC avc: denied { bpf } for pid=1566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:56.616000 audit: BPF prog-id=65 op=LOAD Dec 13 14:30:56.616000 audit[1566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002aafd8 items=0 ppid=1549 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:56.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663335393266656566393132316634626463326466636634393435 Dec 13 14:30:56.627644 env[1206]: time="2024-12-13T14:30:56.627593079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hvcgb,Uid:8121352e-9db3-4635-8b29-eab850389587,Namespace:kube-system,Attempt:0,} returns sandbox id \"daebeafb9e14426a83aab7cadf10b4d7b64d0e8011ddf96ea49e680ecd69a4a1\"" Dec 13 14:30:56.628104 env[1206]: time="2024-12-13T14:30:56.628069082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hdvc8,Uid:ebfc6ec8-5534-4535-ab5f-6b36063d772b,Namespace:calico-system,Attempt:0,} returns sandbox id \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\"" Dec 13 14:30:56.629337 kubelet[1471]: E1213 14:30:56.628752 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:56.629337 kubelet[1471]: E1213 14:30:56.629020 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:56.630048 env[1206]: time="2024-12-13T14:30:56.629985506Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:30:57.120607 kubelet[1471]: E1213 14:30:57.120522 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:30:57.532034 kubelet[1471]: E1213 14:30:57.531905 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:30:57.679888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2125577500.mount: Deactivated successfully. Dec 13 14:30:58.343297 env[1206]: time="2024-12-13T14:30:58.343236713Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:58.345302 env[1206]: time="2024-12-13T14:30:58.345264877Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:58.346801 env[1206]: time="2024-12-13T14:30:58.346774448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:58.348300 env[1206]: time="2024-12-13T14:30:58.348265214Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:58.348591 env[1206]: time="2024-12-13T14:30:58.348570065Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:30:58.349663 env[1206]: time="2024-12-13T14:30:58.349637297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:30:58.350717 env[1206]: time="2024-12-13T14:30:58.350680223Z" level=info msg="CreateContainer within sandbox \"daebeafb9e14426a83aab7cadf10b4d7b64d0e8011ddf96ea49e680ecd69a4a1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:30:58.365607 env[1206]: time="2024-12-13T14:30:58.365566971Z" level=info msg="CreateContainer within sandbox \"daebeafb9e14426a83aab7cadf10b4d7b64d0e8011ddf96ea49e680ecd69a4a1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ecef4ca2489588cbc2d6a2043d1b797c7d0cd368aad479c1e569983956e9a7eb\"" Dec 13 14:30:58.366079 env[1206]: time="2024-12-13T14:30:58.366060276Z" level=info msg="StartContainer for \"ecef4ca2489588cbc2d6a2043d1b797c7d0cd368aad479c1e569983956e9a7eb\"" Dec 13 14:30:58.383164 systemd[1]: Started cri-containerd-ecef4ca2489588cbc2d6a2043d1b797c7d0cd368aad479c1e569983956e9a7eb.scope. Dec 13 14:30:58.397850 kernel: kauditd_printk_skb: 359 callbacks suppressed Dec 13 14:30:58.397983 kernel: audit: type=1400 audit(1734100258.393:454): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.398007 kernel: audit: type=1300 audit(1734100258.393:454): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5c4dfa5b68 items=0 ppid=1532 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5c4dfa5b68 items=0 ppid=1532 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.402277 kernel: audit: type=1327 audit(1734100258.393:454): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656634636132343839353838636263326436613230343364316237 Dec 13 14:30:58.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656634636132343839353838636263326436613230343364316237 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.409393 kernel: audit: type=1400 audit(1734100258.393:455): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.410526 kernel: audit: type=1400 audit(1734100258.393:455): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.415940 kernel: audit: type=1400 audit(1734100258.393:455): avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.419002 kernel: audit: type=1400 audit(1734100258.393:455): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.421964 kernel: audit: type=1400 audit(1734100258.393:455): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.425200 kernel: audit: type=1400 audit(1734100258.393:455): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.425272 env[1206]: time="2024-12-13T14:30:58.425231323Z" level=info msg="StartContainer for \"ecef4ca2489588cbc2d6a2043d1b797c7d0cd368aad479c1e569983956e9a7eb\" returns successfully" Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.393000 audit: BPF prog-id=66 op=LOAD Dec 13 14:30:58.393000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003f6078 items=0 ppid=1532 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656634636132343839353838636263326436613230343364316237 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.429527 kernel: audit: type=1400 audit(1734100258.393:455): avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.397000 audit: BPF prog-id=67 op=LOAD Dec 13 14:30:58.397000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003f60c8 items=0 ppid=1532 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656634636132343839353838636263326436613230343364316237 Dec 13 14:30:58.401000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:30:58.401000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:58.401000 audit: BPF prog-id=68 op=LOAD Dec 13 14:30:58.401000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f6158 items=0 ppid=1532 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656634636132343839353838636263326436613230343364316237 Dec 13 14:30:58.520000 audit[1676]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.520000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0de52c80 a2=0 a3=7ffe0de52c6c items=0 ppid=1627 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:30:58.520000 audit[1677]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.520000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7e4acc50 a2=0 a3=7ffc7e4acc3c items=0 ppid=1627 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:30:58.521000 audit[1678]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.521000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9d2336a0 a2=0 a3=7fff9d23368c items=0 ppid=1627 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:30:58.522000 audit[1679]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.522000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc1ce9ec0 a2=0 a3=7ffcc1ce9eac items=0 ppid=1627 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:30:58.523000 audit[1680]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.523000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc39af690 a2=0 a3=c184d28b4705fd8f items=0 ppid=1627 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:30:58.524000 audit[1682]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.524000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcd699120 a2=0 a3=7fffcd69910c items=0 ppid=1627 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:30:58.532478 kubelet[1471]: E1213 14:30:58.532423 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:30:58.623000 audit[1683]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.623000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff4a48e0e0 a2=0 a3=7fff4a48e0cc items=0 ppid=1627 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:30:58.625000 audit[1685]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.625000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff519b9800 a2=0 a3=7fff519b97ec items=0 ppid=1627 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:30:58.628000 audit[1688]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.628000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff46d40660 a2=0 a3=7fff46d4064c items=0 ppid=1627 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:30:58.630000 audit[1689]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.630000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbcce8250 a2=0 a3=7fffbcce823c items=0 ppid=1627 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:30:58.632000 audit[1691]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.632000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2937e6e0 a2=0 a3=7ffe2937e6cc items=0 ppid=1627 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:30:58.633000 audit[1692]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.633000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee700c580 a2=0 a3=7ffee700c56c items=0 ppid=1627 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:30:58.638000 audit[1694]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.638000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc914eb3e0 a2=0 a3=7ffc914eb3cc items=0 ppid=1627 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:30:58.641000 audit[1697]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.641000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc80ad640 a2=0 a3=7ffdc80ad62c items=0 ppid=1627 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:30:58.642000 audit[1698]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.642000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb5548af0 a2=0 a3=7ffdb5548adc items=0 ppid=1627 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:30:58.644000 audit[1700]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.644000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff865af400 a2=0 a3=7fff865af3ec items=0 ppid=1627 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:30:58.645000 audit[1701]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.645000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb684f1e0 a2=0 a3=7ffdb684f1cc items=0 ppid=1627 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:30:58.647000 audit[1703]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.647000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff39f1f1d0 a2=0 a3=7fff39f1f1bc items=0 ppid=1627 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:58.650000 audit[1706]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.650000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff49dbe690 a2=0 a3=7fff49dbe67c items=0 ppid=1627 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:58.652000 audit[1709]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.652000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6f620a20 a2=0 a3=7ffd6f620a0c items=0 ppid=1627 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:30:58.653000 audit[1710]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.653000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2ecf93f0 a2=0 a3=7ffc2ecf93dc items=0 ppid=1627 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:30:58.655000 audit[1712]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.655000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe2fdad9d0 a2=0 a3=7ffe2fdad9bc items=0 ppid=1627 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:58.680000 audit[1716]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.680000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc1f270210 a2=0 a3=7ffc1f2701fc items=0 ppid=1627 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:58.682000 audit[1717]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.682000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6f9c3310 a2=0 a3=7ffd6f9c32fc items=0 ppid=1627 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:30:58.684000 audit[1719]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:58.684000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1837a9d0 a2=0 a3=7ffe1837a9bc items=0 ppid=1627 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:30:58.725000 audit[1725]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:58.725000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdb4f8fa00 a2=0 a3=7ffdb4f8f9ec items=0 ppid=1627 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:58.778000 audit[1725]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:58.778000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffdb4f8fa00 a2=0 a3=7ffdb4f8f9ec items=0 ppid=1627 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:58.779000 audit[1732]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.779000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0cb6f320 a2=0 a3=7ffd0cb6f30c items=0 ppid=1627 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:30:58.782000 audit[1734]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.782000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9aee98c0 a2=0 a3=7ffc9aee98ac items=0 ppid=1627 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:30:58.784000 audit[1737]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.784000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd062ed00 a2=0 a3=7ffcd062ecec items=0 ppid=1627 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:30:58.785000 audit[1738]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.785000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8a9ca7d0 a2=0 a3=7ffc8a9ca7bc items=0 ppid=1627 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:30:58.787000 audit[1740]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.787000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd8b70a60 a2=0 a3=7ffdd8b70a4c items=0 ppid=1627 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:30:58.788000 audit[1741]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.788000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8fe4ce40 a2=0 a3=7fff8fe4ce2c items=0 ppid=1627 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:30:58.791000 audit[1743]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.791000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6a38e680 a2=0 a3=7fff6a38e66c items=0 ppid=1627 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:30:58.793000 audit[1746]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.793000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd6447e870 a2=0 a3=7ffd6447e85c items=0 ppid=1627 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:30:58.794000 audit[1747]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.794000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2f708c10 a2=0 a3=7ffd2f708bfc items=0 ppid=1627 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:30:58.796000 audit[1749]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.796000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdad17bd70 a2=0 a3=7ffdad17bd5c items=0 ppid=1627 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:30:58.797000 audit[1750]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.797000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcff484090 a2=0 a3=7ffcff48407c items=0 ppid=1627 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:30:58.799000 audit[1752]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.799000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedfc770d0 a2=0 a3=7ffedfc770bc items=0 ppid=1627 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:58.802000 audit[1755]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.802000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0c9c2210 a2=0 a3=7ffc0c9c21fc items=0 ppid=1627 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:30:58.805000 audit[1758]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.805000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff77335dc0 a2=0 a3=7fff77335dac items=0 ppid=1627 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:30:58.806000 audit[1759]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.806000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffffef81cc0 a2=0 a3=7ffffef81cac items=0 ppid=1627 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:30:58.808000 audit[1761]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.808000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff8f7fb5e0 a2=0 a3=7fff8f7fb5cc items=0 ppid=1627 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:58.811000 audit[1764]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.811000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffcbfa34b0 a2=0 a3=7fffcbfa349c items=0 ppid=1627 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:58.812000 audit[1765]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.812000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd179bd90 a2=0 a3=7ffcd179bd7c items=0 ppid=1627 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:30:58.814000 audit[1767]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.814000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe9f26db20 a2=0 a3=7ffe9f26db0c items=0 ppid=1627 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:30:58.815000 audit[1768]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.815000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1d55a1c0 a2=0 a3=7ffd1d55a1ac items=0 ppid=1627 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.815000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:30:58.817000 audit[1770]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.817000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6de84c90 a2=0 a3=7ffe6de84c7c items=0 ppid=1627 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:58.820000 audit[1773]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:58.820000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1dbbb040 a2=0 a3=7fff1dbbb02c items=0 ppid=1627 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:58.823000 audit[1775]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:30:58.823000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff1b308860 a2=0 a3=7fff1b30884c items=0 ppid=1627 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.823000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:58.823000 audit[1775]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:30:58.823000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff1b308860 a2=0 a3=7fff1b30884c items=0 ppid=1627 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:58.823000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:59.119846 kubelet[1471]: E1213 14:30:59.119808 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:30:59.127992 kubelet[1471]: E1213 14:30:59.127962 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:59.192417 kubelet[1471]: E1213 14:30:59.192390 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.192417 kubelet[1471]: W1213 14:30:59.192405 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.192417 kubelet[1471]: E1213 14:30:59.192421 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.192664 kubelet[1471]: E1213 14:30:59.192621 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.192664 kubelet[1471]: W1213 14:30:59.192630 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.192664 kubelet[1471]: E1213 14:30:59.192639 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.192839 kubelet[1471]: E1213 14:30:59.192817 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.192839 kubelet[1471]: W1213 14:30:59.192828 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.192839 kubelet[1471]: E1213 14:30:59.192835 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.193003 kubelet[1471]: E1213 14:30:59.192984 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.193003 kubelet[1471]: W1213 14:30:59.192995 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.193003 kubelet[1471]: E1213 14:30:59.193001 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.193159 kubelet[1471]: E1213 14:30:59.193147 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.193159 kubelet[1471]: W1213 14:30:59.193156 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.193204 kubelet[1471]: E1213 14:30:59.193163 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.193298 kubelet[1471]: E1213 14:30:59.193287 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.193298 kubelet[1471]: W1213 14:30:59.193296 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.193346 kubelet[1471]: E1213 14:30:59.193303 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.193451 kubelet[1471]: E1213 14:30:59.193439 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.193451 kubelet[1471]: W1213 14:30:59.193448 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.193510 kubelet[1471]: E1213 14:30:59.193455 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.193597 kubelet[1471]: E1213 14:30:59.193585 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.193597 kubelet[1471]: W1213 14:30:59.193595 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.193660 kubelet[1471]: E1213 14:30:59.193609 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.193752 kubelet[1471]: E1213 14:30:59.193740 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.193752 kubelet[1471]: W1213 14:30:59.193749 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.193797 kubelet[1471]: E1213 14:30:59.193756 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.193884 kubelet[1471]: E1213 14:30:59.193872 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.193884 kubelet[1471]: W1213 14:30:59.193882 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194048 kubelet[1471]: E1213 14:30:59.193888 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194048 kubelet[1471]: E1213 14:30:59.194020 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194048 kubelet[1471]: W1213 14:30:59.194025 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194048 kubelet[1471]: E1213 14:30:59.194031 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194152 kubelet[1471]: E1213 14:30:59.194141 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194152 kubelet[1471]: W1213 14:30:59.194149 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194200 kubelet[1471]: E1213 14:30:59.194155 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194276 kubelet[1471]: E1213 14:30:59.194265 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194276 kubelet[1471]: W1213 14:30:59.194274 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194321 kubelet[1471]: E1213 14:30:59.194280 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194424 kubelet[1471]: E1213 14:30:59.194413 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194424 kubelet[1471]: W1213 14:30:59.194422 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194473 kubelet[1471]: E1213 14:30:59.194429 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194565 kubelet[1471]: E1213 14:30:59.194554 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194565 kubelet[1471]: W1213 14:30:59.194563 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194619 kubelet[1471]: E1213 14:30:59.194569 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194728 kubelet[1471]: E1213 14:30:59.194716 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194728 kubelet[1471]: W1213 14:30:59.194725 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194779 kubelet[1471]: E1213 14:30:59.194732 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194858 kubelet[1471]: E1213 14:30:59.194847 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194858 kubelet[1471]: W1213 14:30:59.194855 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.194902 kubelet[1471]: E1213 14:30:59.194862 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.194995 kubelet[1471]: E1213 14:30:59.194984 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.194995 kubelet[1471]: W1213 14:30:59.194993 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.195045 kubelet[1471]: E1213 14:30:59.195000 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.195121 kubelet[1471]: E1213 14:30:59.195110 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.195121 kubelet[1471]: W1213 14:30:59.195118 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.195166 kubelet[1471]: E1213 14:30:59.195126 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.195273 kubelet[1471]: E1213 14:30:59.195261 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.195273 kubelet[1471]: W1213 14:30:59.195272 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.195323 kubelet[1471]: E1213 14:30:59.195280 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.205652 kubelet[1471]: E1213 14:30:59.205628 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.205652 kubelet[1471]: W1213 14:30:59.205646 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.205717 kubelet[1471]: E1213 14:30:59.205664 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.205855 kubelet[1471]: E1213 14:30:59.205845 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.205855 kubelet[1471]: W1213 14:30:59.205853 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.205925 kubelet[1471]: E1213 14:30:59.205865 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.206056 kubelet[1471]: E1213 14:30:59.206032 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.206056 kubelet[1471]: W1213 14:30:59.206046 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.206104 kubelet[1471]: E1213 14:30:59.206058 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.206193 kubelet[1471]: E1213 14:30:59.206180 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.206193 kubelet[1471]: W1213 14:30:59.206190 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.206241 kubelet[1471]: E1213 14:30:59.206201 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.206334 kubelet[1471]: E1213 14:30:59.206322 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.206334 kubelet[1471]: W1213 14:30:59.206332 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.206381 kubelet[1471]: E1213 14:30:59.206342 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.206529 kubelet[1471]: E1213 14:30:59.206515 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.206529 kubelet[1471]: W1213 14:30:59.206524 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.206613 kubelet[1471]: E1213 14:30:59.206537 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.206702 kubelet[1471]: E1213 14:30:59.206689 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.206728 kubelet[1471]: W1213 14:30:59.206702 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.206728 kubelet[1471]: E1213 14:30:59.206711 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.206857 kubelet[1471]: E1213 14:30:59.206843 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.206857 kubelet[1471]: W1213 14:30:59.206854 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.206915 kubelet[1471]: E1213 14:30:59.206867 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.207009 kubelet[1471]: E1213 14:30:59.207000 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.207033 kubelet[1471]: W1213 14:30:59.207010 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.207033 kubelet[1471]: E1213 14:30:59.207017 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.207144 kubelet[1471]: E1213 14:30:59.207135 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.207170 kubelet[1471]: W1213 14:30:59.207144 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.207170 kubelet[1471]: E1213 14:30:59.207150 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.207314 kubelet[1471]: E1213 14:30:59.207300 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.207314 kubelet[1471]: W1213 14:30:59.207309 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.207359 kubelet[1471]: E1213 14:30:59.207316 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.207598 kubelet[1471]: E1213 14:30:59.207590 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:59.207635 kubelet[1471]: W1213 14:30:59.207598 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:59.207635 kubelet[1471]: E1213 14:30:59.207613 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:59.499269 kubelet[1471]: I1213 14:30:59.499154 1471 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hvcgb" podStartSLOduration=3.779446025 podStartE2EDuration="5.499141327s" podCreationTimestamp="2024-12-13 14:30:54 +0000 UTC" firstStartedPulling="2024-12-13 14:30:56.629679742 +0000 UTC m=+3.358579186" lastFinishedPulling="2024-12-13 14:30:58.349375045 +0000 UTC m=+5.078274488" observedRunningTime="2024-12-13 14:30:59.498997157 +0000 UTC m=+6.227896600" watchObservedRunningTime="2024-12-13 14:30:59.499141327 +0000 UTC m=+6.228040770" Dec 13 14:30:59.533442 kubelet[1471]: E1213 14:30:59.533380 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:00.035725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2642075311.mount: Deactivated successfully. Dec 13 14:31:00.129646 kubelet[1471]: E1213 14:31:00.129591 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:00.201475 kubelet[1471]: E1213 14:31:00.201436 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.201475 kubelet[1471]: W1213 14:31:00.201458 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.201679 kubelet[1471]: E1213 14:31:00.201483 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.201739 kubelet[1471]: E1213 14:31:00.201712 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.201739 kubelet[1471]: W1213 14:31:00.201721 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.201739 kubelet[1471]: E1213 14:31:00.201731 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.201895 kubelet[1471]: E1213 14:31:00.201874 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.201895 kubelet[1471]: W1213 14:31:00.201885 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.201895 kubelet[1471]: E1213 14:31:00.201894 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.202048 kubelet[1471]: E1213 14:31:00.202030 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.202048 kubelet[1471]: W1213 14:31:00.202039 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.202048 kubelet[1471]: E1213 14:31:00.202048 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.202209 kubelet[1471]: E1213 14:31:00.202187 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.202209 kubelet[1471]: W1213 14:31:00.202197 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.202209 kubelet[1471]: E1213 14:31:00.202206 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.202351 kubelet[1471]: E1213 14:31:00.202339 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.202351 kubelet[1471]: W1213 14:31:00.202349 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.202426 kubelet[1471]: E1213 14:31:00.202358 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.202516 kubelet[1471]: E1213 14:31:00.202491 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.202516 kubelet[1471]: W1213 14:31:00.202515 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.202612 kubelet[1471]: E1213 14:31:00.202524 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.202679 kubelet[1471]: E1213 14:31:00.202667 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.202679 kubelet[1471]: W1213 14:31:00.202677 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.202758 kubelet[1471]: E1213 14:31:00.202686 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.202847 kubelet[1471]: E1213 14:31:00.202826 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.202847 kubelet[1471]: W1213 14:31:00.202835 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.202847 kubelet[1471]: E1213 14:31:00.202844 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.202985 kubelet[1471]: E1213 14:31:00.202973 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.202985 kubelet[1471]: W1213 14:31:00.202982 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.203061 kubelet[1471]: E1213 14:31:00.202991 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.203130 kubelet[1471]: E1213 14:31:00.203118 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.203130 kubelet[1471]: W1213 14:31:00.203127 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.203202 kubelet[1471]: E1213 14:31:00.203136 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.203274 kubelet[1471]: E1213 14:31:00.203263 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.203274 kubelet[1471]: W1213 14:31:00.203272 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.203351 kubelet[1471]: E1213 14:31:00.203281 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.203434 kubelet[1471]: E1213 14:31:00.203418 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.203434 kubelet[1471]: W1213 14:31:00.203428 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.203520 kubelet[1471]: E1213 14:31:00.203436 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.203629 kubelet[1471]: E1213 14:31:00.203608 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.203629 kubelet[1471]: W1213 14:31:00.203619 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.203629 kubelet[1471]: E1213 14:31:00.203628 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.203771 kubelet[1471]: E1213 14:31:00.203759 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.203771 kubelet[1471]: W1213 14:31:00.203770 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.203846 kubelet[1471]: E1213 14:31:00.203779 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.203917 kubelet[1471]: E1213 14:31:00.203905 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.203917 kubelet[1471]: W1213 14:31:00.203914 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.203992 kubelet[1471]: E1213 14:31:00.203923 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.204063 kubelet[1471]: E1213 14:31:00.204052 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.204063 kubelet[1471]: W1213 14:31:00.204062 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.204143 kubelet[1471]: E1213 14:31:00.204070 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.204210 kubelet[1471]: E1213 14:31:00.204198 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.204210 kubelet[1471]: W1213 14:31:00.204208 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.204284 kubelet[1471]: E1213 14:31:00.204216 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.204354 kubelet[1471]: E1213 14:31:00.204342 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.204354 kubelet[1471]: W1213 14:31:00.204352 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.204457 kubelet[1471]: E1213 14:31:00.204361 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.204526 kubelet[1471]: E1213 14:31:00.204514 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.204526 kubelet[1471]: W1213 14:31:00.204524 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.204612 kubelet[1471]: E1213 14:31:00.204533 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.211899 kubelet[1471]: E1213 14:31:00.211873 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.211899 kubelet[1471]: W1213 14:31:00.211888 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.211985 kubelet[1471]: E1213 14:31:00.211901 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.212324 kubelet[1471]: E1213 14:31:00.212294 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.212324 kubelet[1471]: W1213 14:31:00.212312 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.212324 kubelet[1471]: E1213 14:31:00.212333 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.212612 kubelet[1471]: E1213 14:31:00.212595 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.212612 kubelet[1471]: W1213 14:31:00.212605 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.212665 kubelet[1471]: E1213 14:31:00.212618 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.212873 kubelet[1471]: E1213 14:31:00.212846 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.212873 kubelet[1471]: W1213 14:31:00.212870 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.213023 kubelet[1471]: E1213 14:31:00.212898 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.213068 kubelet[1471]: E1213 14:31:00.213063 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.213104 kubelet[1471]: W1213 14:31:00.213069 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.213104 kubelet[1471]: E1213 14:31:00.213077 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.213277 kubelet[1471]: E1213 14:31:00.213262 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.213277 kubelet[1471]: W1213 14:31:00.213271 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.213373 kubelet[1471]: E1213 14:31:00.213304 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.213410 kubelet[1471]: E1213 14:31:00.213389 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.213410 kubelet[1471]: W1213 14:31:00.213397 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.213410 kubelet[1471]: E1213 14:31:00.213406 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.213608 kubelet[1471]: E1213 14:31:00.213591 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.213608 kubelet[1471]: W1213 14:31:00.213604 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.213702 kubelet[1471]: E1213 14:31:00.213620 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.213813 kubelet[1471]: E1213 14:31:00.213791 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.213813 kubelet[1471]: W1213 14:31:00.213803 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.213879 kubelet[1471]: E1213 14:31:00.213816 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.214023 kubelet[1471]: E1213 14:31:00.214005 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.214023 kubelet[1471]: W1213 14:31:00.214020 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.214106 kubelet[1471]: E1213 14:31:00.214039 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.214255 kubelet[1471]: E1213 14:31:00.214240 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.214255 kubelet[1471]: W1213 14:31:00.214251 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.214331 kubelet[1471]: E1213 14:31:00.214263 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.214444 kubelet[1471]: E1213 14:31:00.214430 1471 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:00.214444 kubelet[1471]: W1213 14:31:00.214440 1471 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:00.214544 kubelet[1471]: E1213 14:31:00.214448 1471 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:00.429784 env[1206]: time="2024-12-13T14:31:00.429727448Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:00.431710 env[1206]: time="2024-12-13T14:31:00.431682986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:00.433130 env[1206]: time="2024-12-13T14:31:00.433097358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:00.434514 env[1206]: time="2024-12-13T14:31:00.434456908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:00.434960 env[1206]: time="2024-12-13T14:31:00.434928662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:31:00.436721 env[1206]: time="2024-12-13T14:31:00.436698622Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:31:00.449052 env[1206]: time="2024-12-13T14:31:00.449019127Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b\"" Dec 13 14:31:00.449442 env[1206]: time="2024-12-13T14:31:00.449407285Z" level=info msg="StartContainer for \"52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b\"" Dec 13 14:31:00.464524 systemd[1]: Started cri-containerd-52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b.scope. Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7faea2a05298 items=0 ppid=1549 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:00.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532666365343665353438366262393834373539363236333736343934 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit: BPF prog-id=69 op=LOAD Dec 13 14:31:00.477000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e3f58 items=0 ppid=1549 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:00.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532666365343665353438366262393834373539363236333736343934 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit: BPF prog-id=70 op=LOAD Dec 13 14:31:00.477000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e3fa8 items=0 ppid=1549 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:00.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532666365343665353438366262393834373539363236333736343934 Dec 13 14:31:00.477000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:31:00.477000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:00.477000 audit: BPF prog-id=71 op=LOAD Dec 13 14:31:00.477000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003be038 items=0 ppid=1549 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:00.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532666365343665353438366262393834373539363236333736343934 Dec 13 14:31:00.496440 systemd[1]: cri-containerd-52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b.scope: Deactivated successfully. Dec 13 14:31:00.502000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:31:00.534470 kubelet[1471]: E1213 14:31:00.534439 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:00.538765 env[1206]: time="2024-12-13T14:31:00.538715440Z" level=info msg="StartContainer for \"52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b\" returns successfully" Dec 13 14:31:00.735056 env[1206]: time="2024-12-13T14:31:00.734938648Z" level=info msg="shim disconnected" id=52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b Dec 13 14:31:00.735056 env[1206]: time="2024-12-13T14:31:00.734981028Z" level=warning msg="cleaning up after shim disconnected" id=52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b namespace=k8s.io Dec 13 14:31:00.735056 env[1206]: time="2024-12-13T14:31:00.734990355Z" level=info msg="cleaning up dead shim" Dec 13 14:31:00.741747 env[1206]: time="2024-12-13T14:31:00.741686824Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1886 runtime=io.containerd.runc.v2\n" Dec 13 14:31:00.995389 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b-rootfs.mount: Deactivated successfully. Dec 13 14:31:01.119799 kubelet[1471]: E1213 14:31:01.119729 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:01.132174 kubelet[1471]: E1213 14:31:01.132141 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:01.132947 env[1206]: time="2024-12-13T14:31:01.132900008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:31:01.535077 kubelet[1471]: E1213 14:31:01.535030 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:02.535874 kubelet[1471]: E1213 14:31:02.535846 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:03.119805 kubelet[1471]: E1213 14:31:03.119757 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:03.536748 kubelet[1471]: E1213 14:31:03.536631 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:04.537587 kubelet[1471]: E1213 14:31:04.537531 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:05.119935 kubelet[1471]: E1213 14:31:05.119815 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:05.537774 kubelet[1471]: E1213 14:31:05.537639 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:06.538368 kubelet[1471]: E1213 14:31:06.538305 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:07.119934 kubelet[1471]: E1213 14:31:07.119880 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:07.538804 kubelet[1471]: E1213 14:31:07.538672 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:07.909449 env[1206]: time="2024-12-13T14:31:07.909320736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:07.910201 env[1206]: time="2024-12-13T14:31:07.910171010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:07.912555 env[1206]: time="2024-12-13T14:31:07.912475422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:07.913848 env[1206]: time="2024-12-13T14:31:07.913811417Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:07.914280 env[1206]: time="2024-12-13T14:31:07.914253727Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:31:07.916422 env[1206]: time="2024-12-13T14:31:07.916378602Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:31:07.931105 env[1206]: time="2024-12-13T14:31:07.931045878Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47\"" Dec 13 14:31:07.931523 env[1206]: time="2024-12-13T14:31:07.931470775Z" level=info msg="StartContainer for \"64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47\"" Dec 13 14:31:07.950396 systemd[1]: Started cri-containerd-64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47.scope. Dec 13 14:31:07.963000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.965249 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:31:07.965318 kernel: audit: type=1400 audit(1734100267.963:518): avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.979109 kernel: audit: type=1300 audit(1734100267.963:518): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa9244b2398 items=0 ppid=1549 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.979187 kernel: audit: type=1327 audit(1734100267.963:518): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653037316633613535613662386538663038363336653533653131 Dec 13 14:31:07.963000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa9244b2398 items=0 ppid=1549 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653037316633613535613662386538663038363336653533653131 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.982302 kernel: audit: type=1400 audit(1734100267.964:519): avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.982344 kernel: audit: type=1400 audit(1734100267.964:519): avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.988121 kernel: audit: type=1400 audit(1734100267.964:519): avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.988177 kernel: audit: type=1400 audit(1734100267.964:519): avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.991099 kernel: audit: type=1400 audit(1734100267.964:519): avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.997361 kernel: audit: type=1400 audit(1734100267.964:519): avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.997429 kernel: audit: type=1400 audit(1734100267.964:519): avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.964000 audit: BPF prog-id=72 op=LOAD Dec 13 14:31:07.964000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002ddba8 items=0 ppid=1549 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653037316633613535613662386538663038363336653533653131 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.968000 audit: BPF prog-id=73 op=LOAD Dec 13 14:31:07.968000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002ddbf8 items=0 ppid=1549 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653037316633613535613662386538663038363336653533653131 Dec 13 14:31:07.974000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:31:07.974000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.974000 audit: BPF prog-id=74 op=LOAD Dec 13 14:31:07.974000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002ddc88 items=0 ppid=1549 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653037316633613535613662386538663038363336653533653131 Dec 13 14:31:08.001756 env[1206]: time="2024-12-13T14:31:08.001678660Z" level=info msg="StartContainer for \"64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47\" returns successfully" Dec 13 14:31:08.161044 kubelet[1471]: E1213 14:31:08.160925 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:08.539641 kubelet[1471]: E1213 14:31:08.539513 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:08.926391 systemd[1]: run-containerd-runc-k8s.io-64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47-runc.8JYJb4.mount: Deactivated successfully. Dec 13 14:31:09.120364 kubelet[1471]: E1213 14:31:09.120320 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:09.162288 kubelet[1471]: E1213 14:31:09.162252 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:09.200996 env[1206]: time="2024-12-13T14:31:09.200871164Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:31:09.202353 systemd[1]: cri-containerd-64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47.scope: Deactivated successfully. Dec 13 14:31:09.209000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:31:09.216880 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47-rootfs.mount: Deactivated successfully. Dec 13 14:31:09.247725 kubelet[1471]: I1213 14:31:09.247698 1471 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:31:09.540596 kubelet[1471]: E1213 14:31:09.540396 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:10.041193 env[1206]: time="2024-12-13T14:31:10.041128927Z" level=info msg="shim disconnected" id=64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47 Dec 13 14:31:10.041193 env[1206]: time="2024-12-13T14:31:10.041173891Z" level=warning msg="cleaning up after shim disconnected" id=64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47 namespace=k8s.io Dec 13 14:31:10.041193 env[1206]: time="2024-12-13T14:31:10.041184611Z" level=info msg="cleaning up dead shim" Dec 13 14:31:10.046516 env[1206]: time="2024-12-13T14:31:10.046472969Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1951 runtime=io.containerd.runc.v2\n" Dec 13 14:31:10.164577 kubelet[1471]: E1213 14:31:10.164540 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:10.165104 env[1206]: time="2024-12-13T14:31:10.165079348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:31:10.411703 systemd[1]: Created slice kubepods-besteffort-pod5ee7ee55_035d_43e6_b502_e8c906818c5f.slice. Dec 13 14:31:10.471478 kubelet[1471]: I1213 14:31:10.471435 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zmcgt\" (UniqueName: \"kubernetes.io/projected/5ee7ee55-035d-43e6-b502-e8c906818c5f-kube-api-access-zmcgt\") pod \"nginx-deployment-8587fbcb89-qs4q7\" (UID: \"5ee7ee55-035d-43e6-b502-e8c906818c5f\") " pod="default/nginx-deployment-8587fbcb89-qs4q7" Dec 13 14:31:10.540901 kubelet[1471]: E1213 14:31:10.540833 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:10.714800 env[1206]: time="2024-12-13T14:31:10.714681809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qs4q7,Uid:5ee7ee55-035d-43e6-b502-e8c906818c5f,Namespace:default,Attempt:0,}" Dec 13 14:31:10.769837 env[1206]: time="2024-12-13T14:31:10.769763697Z" level=error msg="Failed to destroy network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:10.770153 env[1206]: time="2024-12-13T14:31:10.770114715Z" level=error msg="encountered an error cleaning up failed sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:10.770212 env[1206]: time="2024-12-13T14:31:10.770163277Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qs4q7,Uid:5ee7ee55-035d-43e6-b502-e8c906818c5f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:10.770414 kubelet[1471]: E1213 14:31:10.770372 1471 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:10.770488 kubelet[1471]: E1213 14:31:10.770440 1471 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-qs4q7" Dec 13 14:31:10.770488 kubelet[1471]: E1213 14:31:10.770458 1471 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-qs4q7" Dec 13 14:31:10.770593 kubelet[1471]: E1213 14:31:10.770505 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-qs4q7_default(5ee7ee55-035d-43e6-b502-e8c906818c5f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-qs4q7_default(5ee7ee55-035d-43e6-b502-e8c906818c5f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-qs4q7" podUID="5ee7ee55-035d-43e6-b502-e8c906818c5f" Dec 13 14:31:10.771508 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131-shm.mount: Deactivated successfully. Dec 13 14:31:11.124415 systemd[1]: Created slice kubepods-besteffort-pod89cc47c1_7354_46a5_8a7c_c38f4a67c0a6.slice. Dec 13 14:31:11.126195 env[1206]: time="2024-12-13T14:31:11.126154056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zk2cr,Uid:89cc47c1-7354-46a5-8a7c-c38f4a67c0a6,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:11.166015 kubelet[1471]: I1213 14:31:11.165978 1471 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:11.166520 env[1206]: time="2024-12-13T14:31:11.166477988Z" level=info msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" Dec 13 14:31:11.187515 env[1206]: time="2024-12-13T14:31:11.187463233Z" level=error msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" failed" error="failed to destroy network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:11.187683 kubelet[1471]: E1213 14:31:11.187643 1471 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:11.187751 kubelet[1471]: E1213 14:31:11.187704 1471 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131"} Dec 13 14:31:11.187778 kubelet[1471]: E1213 14:31:11.187769 1471 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ee7ee55-035d-43e6-b502-e8c906818c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:11.187848 kubelet[1471]: E1213 14:31:11.187796 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ee7ee55-035d-43e6-b502-e8c906818c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-qs4q7" podUID="5ee7ee55-035d-43e6-b502-e8c906818c5f" Dec 13 14:31:11.249036 env[1206]: time="2024-12-13T14:31:11.248963368Z" level=error msg="Failed to destroy network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:11.249357 env[1206]: time="2024-12-13T14:31:11.249310669Z" level=error msg="encountered an error cleaning up failed sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:11.249389 env[1206]: time="2024-12-13T14:31:11.249372445Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zk2cr,Uid:89cc47c1-7354-46a5-8a7c-c38f4a67c0a6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:11.249630 kubelet[1471]: E1213 14:31:11.249593 1471 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:11.249692 kubelet[1471]: E1213 14:31:11.249648 1471 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zk2cr" Dec 13 14:31:11.249692 kubelet[1471]: E1213 14:31:11.249667 1471 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zk2cr" Dec 13 14:31:11.249743 kubelet[1471]: E1213 14:31:11.249706 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zk2cr_calico-system(89cc47c1-7354-46a5-8a7c-c38f4a67c0a6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zk2cr_calico-system(89cc47c1-7354-46a5-8a7c-c38f4a67c0a6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:11.541441 kubelet[1471]: E1213 14:31:11.541313 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:11.582435 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317-shm.mount: Deactivated successfully. Dec 13 14:31:12.168627 kubelet[1471]: I1213 14:31:12.168586 1471 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:12.169384 env[1206]: time="2024-12-13T14:31:12.169335794Z" level=info msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" Dec 13 14:31:12.193851 env[1206]: time="2024-12-13T14:31:12.193788528Z" level=error msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" failed" error="failed to destroy network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:12.194085 kubelet[1471]: E1213 14:31:12.194042 1471 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:12.194156 kubelet[1471]: E1213 14:31:12.194120 1471 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317"} Dec 13 14:31:12.194190 kubelet[1471]: E1213 14:31:12.194152 1471 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:12.194190 kubelet[1471]: E1213 14:31:12.194179 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:12.542550 kubelet[1471]: E1213 14:31:12.542384 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:13.530487 kubelet[1471]: E1213 14:31:13.530452 1471 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:13.542643 kubelet[1471]: E1213 14:31:13.542624 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:14.543117 kubelet[1471]: E1213 14:31:14.543035 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:15.543582 kubelet[1471]: E1213 14:31:15.543528 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:16.544289 kubelet[1471]: E1213 14:31:16.544229 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:16.983125 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3853917762.mount: Deactivated successfully. Dec 13 14:31:17.545194 kubelet[1471]: E1213 14:31:17.545133 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:18.545818 kubelet[1471]: E1213 14:31:18.545763 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:18.754607 env[1206]: time="2024-12-13T14:31:18.754551427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:18.829129 env[1206]: time="2024-12-13T14:31:18.829073202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:18.831270 env[1206]: time="2024-12-13T14:31:18.831218413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:18.833441 env[1206]: time="2024-12-13T14:31:18.833384935Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:18.833776 env[1206]: time="2024-12-13T14:31:18.833742043Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:31:18.842752 env[1206]: time="2024-12-13T14:31:18.842700447Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:31:18.858826 env[1206]: time="2024-12-13T14:31:18.858785787Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\"" Dec 13 14:31:18.859338 env[1206]: time="2024-12-13T14:31:18.859275466Z" level=info msg="StartContainer for \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\"" Dec 13 14:31:18.887678 systemd[1]: Started cri-containerd-18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8.scope. Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.906247 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:31:18.906307 kernel: audit: type=1400 audit(1734100278.904:525): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8921bf89f8 items=0 ppid=1549 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.917628 kernel: audit: type=1300 audit(1734100278.904:525): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8921bf89f8 items=0 ppid=1549 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.917682 kernel: audit: type=1327 audit(1734100278.904:525): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623032656631626432663935623662666432653731393262383164 Dec 13 14:31:18.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623032656631626432663935623662666432653731393262383164 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.920754 kernel: audit: type=1400 audit(1734100278.904:526): avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.920903 kernel: audit: type=1400 audit(1734100278.904:526): avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.926738 kernel: audit: type=1400 audit(1734100278.904:526): avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.929777 kernel: audit: type=1400 audit(1734100278.904:526): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.933030 kernel: audit: type=1400 audit(1734100278.904:526): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.933767 kernel: audit: type=1400 audit(1734100278.904:526): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.939071 kernel: audit: type=1400 audit(1734100278.904:526): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.904000 audit: BPF prog-id=75 op=LOAD Dec 13 14:31:18.904000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038eaf8 items=0 ppid=1549 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623032656631626432663935623662666432653731393262383164 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.908000 audit: BPF prog-id=76 op=LOAD Dec 13 14:31:18.908000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038eb48 items=0 ppid=1549 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623032656631626432663935623662666432653731393262383164 Dec 13 14:31:18.913000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:31:18.913000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.913000 audit: BPF prog-id=77 op=LOAD Dec 13 14:31:18.913000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038ebd8 items=0 ppid=1549 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623032656631626432663935623662666432653731393262383164 Dec 13 14:31:18.968840 env[1206]: time="2024-12-13T14:31:18.968789999Z" level=info msg="StartContainer for \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\" returns successfully" Dec 13 14:31:19.003001 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:31:19.003097 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:31:19.042446 systemd[1]: cri-containerd-18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8.scope: Deactivated successfully. Dec 13 14:31:19.047000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:31:19.181785 kubelet[1471]: E1213 14:31:19.181696 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:19.437016 kubelet[1471]: I1213 14:31:19.436869 1471 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-hdvc8" podStartSLOduration=3.232210503 podStartE2EDuration="25.436851599s" podCreationTimestamp="2024-12-13 14:30:54 +0000 UTC" firstStartedPulling="2024-12-13 14:30:56.629924481 +0000 UTC m=+3.358823914" lastFinishedPulling="2024-12-13 14:31:18.834565566 +0000 UTC m=+25.563465010" observedRunningTime="2024-12-13 14:31:19.4367364 +0000 UTC m=+26.165635843" watchObservedRunningTime="2024-12-13 14:31:19.436851599 +0000 UTC m=+26.165751042" Dec 13 14:31:19.494200 env[1206]: time="2024-12-13T14:31:19.494147557Z" level=info msg="shim disconnected" id=18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 Dec 13 14:31:19.494200 env[1206]: time="2024-12-13T14:31:19.494195258Z" level=warning msg="cleaning up after shim disconnected" id=18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 namespace=k8s.io Dec 13 14:31:19.494200 env[1206]: time="2024-12-13T14:31:19.494204245Z" level=info msg="cleaning up dead shim" Dec 13 14:31:19.494522 env[1206]: time="2024-12-13T14:31:19.494421186Z" level=error msg="ExecSync for \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"a102d4cfbf74e143ee9c4487c3e0af303a820f7ceab34486f830dab844f786e7\": task 18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 not found: not found" Dec 13 14:31:19.494744 kubelet[1471]: E1213 14:31:19.494705 1471 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"a102d4cfbf74e143ee9c4487c3e0af303a820f7ceab34486f830dab844f786e7\": task 18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 not found: not found" containerID="18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:31:19.495686 env[1206]: time="2024-12-13T14:31:19.495657421Z" level=error msg="ExecSync for \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 not found: not found" Dec 13 14:31:19.495847 kubelet[1471]: E1213 14:31:19.495748 1471 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 not found: not found" containerID="18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:31:19.496625 env[1206]: time="2024-12-13T14:31:19.496579801Z" level=error msg="ExecSync for \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 not found: not found" Dec 13 14:31:19.496786 kubelet[1471]: E1213 14:31:19.496662 1471 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8 not found: not found" containerID="18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:31:19.500372 env[1206]: time="2024-12-13T14:31:19.500327829Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2150 runtime=io.containerd.runc.v2\n" Dec 13 14:31:19.546452 kubelet[1471]: E1213 14:31:19.546400 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:19.838480 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8-rootfs.mount: Deactivated successfully. Dec 13 14:31:20.184291 kubelet[1471]: I1213 14:31:20.184175 1471 scope.go:117] "RemoveContainer" containerID="18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8" Dec 13 14:31:20.184291 kubelet[1471]: E1213 14:31:20.184246 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:20.185733 env[1206]: time="2024-12-13T14:31:20.185696943Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 14:31:20.204131 env[1206]: time="2024-12-13T14:31:20.204074395Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be\"" Dec 13 14:31:20.204842 env[1206]: time="2024-12-13T14:31:20.204815489Z" level=info msg="StartContainer for \"8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be\"" Dec 13 14:31:20.220596 systemd[1]: Started cri-containerd-8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be.scope. Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f20842d8128 items=0 ppid=1549 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653031323035663039626238306534323439656339656536643966 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.230000 audit: BPF prog-id=78 op=LOAD Dec 13 14:31:20.230000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e7eb8 items=0 ppid=1549 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653031323035663039626238306534323439656339656536643966 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit: BPF prog-id=79 op=LOAD Dec 13 14:31:20.231000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e7f08 items=0 ppid=1549 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653031323035663039626238306534323439656339656536643966 Dec 13 14:31:20.231000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:31:20.231000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.231000 audit: BPF prog-id=80 op=LOAD Dec 13 14:31:20.231000 audit[2170]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e7f98 items=0 ppid=1549 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653031323035663039626238306534323439656339656536643966 Dec 13 14:31:20.245007 env[1206]: time="2024-12-13T14:31:20.244952392Z" level=info msg="StartContainer for \"8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be\" returns successfully" Dec 13 14:31:20.284927 systemd[1]: cri-containerd-8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be.scope: Deactivated successfully. Dec 13 14:31:20.291000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:31:20.306533 env[1206]: time="2024-12-13T14:31:20.306471429Z" level=info msg="shim disconnected" id=8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be Dec 13 14:31:20.306672 env[1206]: time="2024-12-13T14:31:20.306533657Z" level=warning msg="cleaning up after shim disconnected" id=8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be namespace=k8s.io Dec 13 14:31:20.306672 env[1206]: time="2024-12-13T14:31:20.306543595Z" level=info msg="cleaning up dead shim" Dec 13 14:31:20.312611 env[1206]: time="2024-12-13T14:31:20.312561141Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2212 runtime=io.containerd.runc.v2\n" Dec 13 14:31:20.547072 kubelet[1471]: E1213 14:31:20.546936 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:20.838790 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be-rootfs.mount: Deactivated successfully. Dec 13 14:31:21.188728 kubelet[1471]: I1213 14:31:21.188418 1471 scope.go:117] "RemoveContainer" containerID="18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8" Dec 13 14:31:21.188728 kubelet[1471]: I1213 14:31:21.188676 1471 scope.go:117] "RemoveContainer" containerID="8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be" Dec 13 14:31:21.188728 kubelet[1471]: E1213 14:31:21.188728 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:21.188902 kubelet[1471]: E1213 14:31:21.188799 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-hdvc8_calico-system(ebfc6ec8-5534-4535-ab5f-6b36063d772b)\"" pod="calico-system/calico-node-hdvc8" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" Dec 13 14:31:21.189606 env[1206]: time="2024-12-13T14:31:21.189573041Z" level=info msg="RemoveContainer for \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\"" Dec 13 14:31:21.205928 env[1206]: time="2024-12-13T14:31:21.205872172Z" level=info msg="RemoveContainer for \"18b02ef1bd2f95b6bfd2e7192b81dc90e7bee5dbfd4d52c3e4e83b5d3ad608a8\" returns successfully" Dec 13 14:31:21.548192 kubelet[1471]: E1213 14:31:21.548073 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:22.120954 env[1206]: time="2024-12-13T14:31:22.120905353Z" level=info msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" Dec 13 14:31:22.142382 env[1206]: time="2024-12-13T14:31:22.142316682Z" level=error msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" failed" error="failed to destroy network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:22.142587 kubelet[1471]: E1213 14:31:22.142545 1471 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:22.142635 kubelet[1471]: E1213 14:31:22.142597 1471 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131"} Dec 13 14:31:22.142635 kubelet[1471]: E1213 14:31:22.142629 1471 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ee7ee55-035d-43e6-b502-e8c906818c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:22.142719 kubelet[1471]: E1213 14:31:22.142649 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ee7ee55-035d-43e6-b502-e8c906818c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-qs4q7" podUID="5ee7ee55-035d-43e6-b502-e8c906818c5f" Dec 13 14:31:22.191595 kubelet[1471]: I1213 14:31:22.191573 1471 scope.go:117] "RemoveContainer" containerID="8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be" Dec 13 14:31:22.191713 kubelet[1471]: E1213 14:31:22.191627 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:22.191713 kubelet[1471]: E1213 14:31:22.191696 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-hdvc8_calico-system(ebfc6ec8-5534-4535-ab5f-6b36063d772b)\"" pod="calico-system/calico-node-hdvc8" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" Dec 13 14:31:22.549165 kubelet[1471]: E1213 14:31:22.549053 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:23.120601 env[1206]: time="2024-12-13T14:31:23.120556190Z" level=info msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" Dec 13 14:31:23.142399 env[1206]: time="2024-12-13T14:31:23.142326013Z" level=error msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" failed" error="failed to destroy network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:23.142575 kubelet[1471]: E1213 14:31:23.142543 1471 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:23.142648 kubelet[1471]: E1213 14:31:23.142595 1471 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317"} Dec 13 14:31:23.142648 kubelet[1471]: E1213 14:31:23.142624 1471 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:23.142762 kubelet[1471]: E1213 14:31:23.142643 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:23.550300 kubelet[1471]: E1213 14:31:23.550166 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:24.551358 kubelet[1471]: E1213 14:31:24.551284 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:24.973660 update_engine[1197]: I1213 14:31:24.973590 1197 update_attempter.cc:509] Updating boot flags... Dec 13 14:31:25.552110 kubelet[1471]: E1213 14:31:25.552055 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:26.552356 kubelet[1471]: E1213 14:31:26.552289 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:27.552831 kubelet[1471]: E1213 14:31:27.552748 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:28.553853 kubelet[1471]: E1213 14:31:28.553786 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:29.554113 kubelet[1471]: E1213 14:31:29.554067 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:30.554400 kubelet[1471]: E1213 14:31:30.554357 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:31.554507 kubelet[1471]: E1213 14:31:31.554460 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:32.554818 kubelet[1471]: E1213 14:31:32.554765 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:33.120802 env[1206]: time="2024-12-13T14:31:33.120748456Z" level=info msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" Dec 13 14:31:33.121160 kubelet[1471]: I1213 14:31:33.120536 1471 scope.go:117] "RemoveContainer" containerID="8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be" Dec 13 14:31:33.121160 kubelet[1471]: E1213 14:31:33.121140 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:33.123145 env[1206]: time="2024-12-13T14:31:33.122843934Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 14:31:33.143989 env[1206]: time="2024-12-13T14:31:33.143922004Z" level=error msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" failed" error="failed to destroy network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:33.144142 kubelet[1471]: E1213 14:31:33.144112 1471 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:33.144184 kubelet[1471]: E1213 14:31:33.144157 1471 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131"} Dec 13 14:31:33.144210 kubelet[1471]: E1213 14:31:33.144187 1471 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ee7ee55-035d-43e6-b502-e8c906818c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:33.144283 kubelet[1471]: E1213 14:31:33.144207 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ee7ee55-035d-43e6-b502-e8c906818c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-qs4q7" podUID="5ee7ee55-035d-43e6-b502-e8c906818c5f" Dec 13 14:31:33.223516 env[1206]: time="2024-12-13T14:31:33.223452877Z" level=info msg="CreateContainer within sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609\"" Dec 13 14:31:33.223936 env[1206]: time="2024-12-13T14:31:33.223911391Z" level=info msg="StartContainer for \"1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609\"" Dec 13 14:31:33.240629 systemd[1]: Started cri-containerd-1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609.scope. Dec 13 14:31:33.253876 kernel: kauditd_printk_skb: 78 callbacks suppressed Dec 13 14:31:33.254007 kernel: audit: type=1400 audit(1734100293.251:539): avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f204ab24d38 items=0 ppid=1549 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:33.262046 kernel: audit: type=1300 audit(1734100293.251:539): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f204ab24d38 items=0 ppid=1549 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:33.262095 kernel: audit: type=1327 audit(1734100293.251:539): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316132656362356234323066643139303964336433333437323231 Dec 13 14:31:33.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316132656362356234323066643139303964336433333437323231 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.269580 kernel: audit: type=1400 audit(1734100293.251:540): avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.269621 kernel: audit: type=1400 audit(1734100293.251:540): avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.272743 kernel: audit: type=1400 audit(1734100293.251:540): avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.279258 kernel: audit: type=1400 audit(1734100293.251:540): avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.286415 kernel: audit: type=1400 audit(1734100293.251:540): avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.286465 kernel: audit: type=1400 audit(1734100293.251:540): avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.290223 env[1206]: time="2024-12-13T14:31:33.290191992Z" level=info msg="StartContainer for \"1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609\" returns successfully" Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.251000 audit: BPF prog-id=81 op=LOAD Dec 13 14:31:33.251000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a6118 items=0 ppid=1549 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:33.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316132656362356234323066643139303964336433333437323231 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.255000 audit: BPF prog-id=82 op=LOAD Dec 13 14:31:33.255000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a6168 items=0 ppid=1549 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:33.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316132656362356234323066643139303964336433333437323231 Dec 13 14:31:33.264000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:31:33.264000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit: BPF prog-id=83 op=LOAD Dec 13 14:31:33.264000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a61f8 items=0 ppid=1549 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:33.291583 kernel: audit: type=1400 audit(1734100293.251:540): avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:33.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316132656362356234323066643139303964336433333437323231 Dec 13 14:31:33.330153 systemd[1]: cri-containerd-1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609.scope: Deactivated successfully. Dec 13 14:31:33.335000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:31:33.352022 env[1206]: time="2024-12-13T14:31:33.351973907Z" level=info msg="shim disconnected" id=1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609 Dec 13 14:31:33.352022 env[1206]: time="2024-12-13T14:31:33.352014324Z" level=warning msg="cleaning up after shim disconnected" id=1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609 namespace=k8s.io Dec 13 14:31:33.352022 env[1206]: time="2024-12-13T14:31:33.352022239Z" level=info msg="cleaning up dead shim" Dec 13 14:31:33.357050 env[1206]: time="2024-12-13T14:31:33.357019413Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2363 runtime=io.containerd.runc.v2\n" Dec 13 14:31:33.530303 kubelet[1471]: E1213 14:31:33.530175 1471 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:33.555823 kubelet[1471]: E1213 14:31:33.555790 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:34.178427 systemd[1]: run-containerd-runc-k8s.io-1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609-runc.vGWTRG.mount: Deactivated successfully. Dec 13 14:31:34.178517 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609-rootfs.mount: Deactivated successfully. Dec 13 14:31:34.211310 kubelet[1471]: I1213 14:31:34.211292 1471 scope.go:117] "RemoveContainer" containerID="8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be" Dec 13 14:31:34.211630 kubelet[1471]: I1213 14:31:34.211614 1471 scope.go:117] "RemoveContainer" containerID="1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609" Dec 13 14:31:34.211692 kubelet[1471]: E1213 14:31:34.211681 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:34.211786 kubelet[1471]: E1213 14:31:34.211766 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-hdvc8_calico-system(ebfc6ec8-5534-4535-ab5f-6b36063d772b)\"" pod="calico-system/calico-node-hdvc8" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" Dec 13 14:31:34.212156 env[1206]: time="2024-12-13T14:31:34.212124474Z" level=info msg="RemoveContainer for \"8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be\"" Dec 13 14:31:34.214996 env[1206]: time="2024-12-13T14:31:34.214963441Z" level=info msg="RemoveContainer for \"8ce01205f09bb80e4249ec9ee6d9f4b0931dd6ce3f983a241e52f7c6a807c4be\" returns successfully" Dec 13 14:31:34.556168 kubelet[1471]: E1213 14:31:34.556029 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:35.120571 env[1206]: time="2024-12-13T14:31:35.120528242Z" level=info msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" Dec 13 14:31:35.138119 env[1206]: time="2024-12-13T14:31:35.138054051Z" level=error msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" failed" error="failed to destroy network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:35.138330 kubelet[1471]: E1213 14:31:35.138292 1471 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:35.138380 kubelet[1471]: E1213 14:31:35.138345 1471 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317"} Dec 13 14:31:35.138406 kubelet[1471]: E1213 14:31:35.138390 1471 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:35.138470 kubelet[1471]: E1213 14:31:35.138417 1471 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zk2cr" podUID="89cc47c1-7354-46a5-8a7c-c38f4a67c0a6" Dec 13 14:31:35.556892 kubelet[1471]: E1213 14:31:35.556780 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:36.557265 kubelet[1471]: E1213 14:31:36.557209 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:37.558020 kubelet[1471]: E1213 14:31:37.557959 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:38.558603 kubelet[1471]: E1213 14:31:38.558546 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:39.448938 env[1206]: time="2024-12-13T14:31:39.448863731Z" level=info msg="StopPodSandbox for \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\"" Dec 13 14:31:39.448938 env[1206]: time="2024-12-13T14:31:39.448934594Z" level=info msg="Container to stop \"52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:39.449407 env[1206]: time="2024-12-13T14:31:39.448952418Z" level=info msg="Container to stop \"64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:39.449407 env[1206]: time="2024-12-13T14:31:39.448967857Z" level=info msg="Container to stop \"1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:39.450622 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b-shm.mount: Deactivated successfully. Dec 13 14:31:39.454000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:31:39.456238 systemd[1]: cri-containerd-b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b.scope: Deactivated successfully. Dec 13 14:31:39.457488 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:31:39.457589 kernel: audit: type=1334 audit(1734100299.454:546): prog-id=62 op=UNLOAD Dec 13 14:31:39.459000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:31:39.462516 kernel: audit: type=1334 audit(1734100299.459:547): prog-id=65 op=UNLOAD Dec 13 14:31:39.471920 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b-rootfs.mount: Deactivated successfully. Dec 13 14:31:39.478432 env[1206]: time="2024-12-13T14:31:39.478381008Z" level=info msg="shim disconnected" id=b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b Dec 13 14:31:39.478432 env[1206]: time="2024-12-13T14:31:39.478424881Z" level=warning msg="cleaning up after shim disconnected" id=b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b namespace=k8s.io Dec 13 14:31:39.478432 env[1206]: time="2024-12-13T14:31:39.478433186Z" level=info msg="cleaning up dead shim" Dec 13 14:31:39.484144 env[1206]: time="2024-12-13T14:31:39.484073878Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2418 runtime=io.containerd.runc.v2\n" Dec 13 14:31:39.484482 env[1206]: time="2024-12-13T14:31:39.484451488Z" level=info msg="TearDown network for sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" successfully" Dec 13 14:31:39.484547 env[1206]: time="2024-12-13T14:31:39.484483669Z" level=info msg="StopPodSandbox for \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" returns successfully" Dec 13 14:31:39.515329 kubelet[1471]: E1213 14:31:39.515302 1471 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="install-cni" Dec 13 14:31:39.515329 kubelet[1471]: E1213 14:31:39.515323 1471 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="calico-node" Dec 13 14:31:39.515329 kubelet[1471]: E1213 14:31:39.515329 1471 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="calico-node" Dec 13 14:31:39.515329 kubelet[1471]: E1213 14:31:39.515334 1471 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="calico-node" Dec 13 14:31:39.515329 kubelet[1471]: E1213 14:31:39.515338 1471 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="flexvol-driver" Dec 13 14:31:39.515656 kubelet[1471]: I1213 14:31:39.515354 1471 memory_manager.go:354] "RemoveStaleState removing state" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="calico-node" Dec 13 14:31:39.515656 kubelet[1471]: I1213 14:31:39.515359 1471 memory_manager.go:354] "RemoveStaleState removing state" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="calico-node" Dec 13 14:31:39.515656 kubelet[1471]: I1213 14:31:39.515375 1471 memory_manager.go:354] "RemoveStaleState removing state" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" containerName="calico-node" Dec 13 14:31:39.520042 systemd[1]: Created slice kubepods-besteffort-pod79fb70a1_5228_4273_a818_917726f23298.slice. Dec 13 14:31:39.528674 kubelet[1471]: I1213 14:31:39.528635 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-xtables-lock\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.528674 kubelet[1471]: I1213 14:31:39.528673 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ebfc6ec8-5534-4535-ab5f-6b36063d772b-tigera-ca-bundle\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.528877 kubelet[1471]: I1213 14:31:39.528698 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-run-calico\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.528877 kubelet[1471]: I1213 14:31:39.528715 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-net-dir\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.528877 kubelet[1471]: I1213 14:31:39.528706 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.528877 kubelet[1471]: I1213 14:31:39.528731 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-policysync\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.528877 kubelet[1471]: I1213 14:31:39.528748 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-bin-dir\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.528877 kubelet[1471]: I1213 14:31:39.528758 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.529084 kubelet[1471]: I1213 14:31:39.528761 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.529084 kubelet[1471]: I1213 14:31:39.528764 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-log-dir\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.529084 kubelet[1471]: I1213 14:31:39.528787 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.529084 kubelet[1471]: I1213 14:31:39.528800 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-vq4n9\" (UniqueName: \"kubernetes.io/projected/ebfc6ec8-5534-4535-ab5f-6b36063d772b-kube-api-access-vq4n9\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.529084 kubelet[1471]: I1213 14:31:39.528810 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-policysync" (OuterVolumeSpecName: "policysync") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.529258 kubelet[1471]: I1213 14:31:39.528823 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-lib-calico\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.529258 kubelet[1471]: I1213 14:31:39.528848 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ebfc6ec8-5534-4535-ab5f-6b36063d772b-node-certs\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.529258 kubelet[1471]: I1213 14:31:39.528865 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-flexvol-driver-host\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.529258 kubelet[1471]: I1213 14:31:39.528883 1471 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-lib-modules\") pod \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\" (UID: \"ebfc6ec8-5534-4535-ab5f-6b36063d772b\") " Dec 13 14:31:39.529258 kubelet[1471]: I1213 14:31:39.528929 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-cni-log-dir\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529258 kubelet[1471]: I1213 14:31:39.528954 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-var-run-calico\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529476 kubelet[1471]: I1213 14:31:39.528973 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-flexvol-driver-host\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529476 kubelet[1471]: I1213 14:31:39.528994 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/79fb70a1-5228-4273-a818-917726f23298-node-certs\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529476 kubelet[1471]: I1213 14:31:39.529013 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-var-lib-calico\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529476 kubelet[1471]: I1213 14:31:39.529031 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-cni-net-dir\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529476 kubelet[1471]: I1213 14:31:39.529048 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-policysync\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529673 kubelet[1471]: I1213 14:31:39.529068 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/79fb70a1-5228-4273-a818-917726f23298-tigera-ca-bundle\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529673 kubelet[1471]: I1213 14:31:39.529086 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-xtables-lock\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529673 kubelet[1471]: I1213 14:31:39.529107 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-lib-modules\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529673 kubelet[1471]: I1213 14:31:39.529126 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/79fb70a1-5228-4273-a818-917726f23298-cni-bin-dir\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529673 kubelet[1471]: I1213 14:31:39.529161 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9g4lz\" (UniqueName: \"kubernetes.io/projected/79fb70a1-5228-4273-a818-917726f23298-kube-api-access-9g4lz\") pod \"calico-node-fmbmw\" (UID: \"79fb70a1-5228-4273-a818-917726f23298\") " pod="calico-system/calico-node-fmbmw" Dec 13 14:31:39.529673 kubelet[1471]: I1213 14:31:39.529183 1471 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-net-dir\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.529867 kubelet[1471]: I1213 14:31:39.529194 1471 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-xtables-lock\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.529867 kubelet[1471]: I1213 14:31:39.529205 1471 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-run-calico\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.529867 kubelet[1471]: I1213 14:31:39.529228 1471 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-policysync\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.529867 kubelet[1471]: I1213 14:31:39.529239 1471 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-log-dir\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.529867 kubelet[1471]: I1213 14:31:39.528825 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.529867 kubelet[1471]: I1213 14:31:39.529281 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.530054 kubelet[1471]: I1213 14:31:39.529538 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.530054 kubelet[1471]: I1213 14:31:39.529565 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.532575 kubelet[1471]: I1213 14:31:39.532271 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/ebfc6ec8-5534-4535-ab5f-6b36063d772b-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:31:39.533062 systemd[1]: var-lib-kubelet-pods-ebfc6ec8\x2d5534\x2d4535\x2dab5f\x2d6b36063d772b-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:31:39.534690 kubelet[1471]: I1213 14:31:39.534655 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/ebfc6ec8-5534-4535-ab5f-6b36063d772b-node-certs" (OuterVolumeSpecName: "node-certs") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:31:39.534750 kubelet[1471]: I1213 14:31:39.534658 1471 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/ebfc6ec8-5534-4535-ab5f-6b36063d772b-kube-api-access-vq4n9" (OuterVolumeSpecName: "kube-api-access-vq4n9") pod "ebfc6ec8-5534-4535-ab5f-6b36063d772b" (UID: "ebfc6ec8-5534-4535-ab5f-6b36063d772b"). InnerVolumeSpecName "kube-api-access-vq4n9". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:31:39.535095 systemd[1]: var-lib-kubelet-pods-ebfc6ec8\x2d5534\x2d4535\x2dab5f\x2d6b36063d772b-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dvq4n9.mount: Deactivated successfully. Dec 13 14:31:39.535198 systemd[1]: var-lib-kubelet-pods-ebfc6ec8\x2d5534\x2d4535\x2dab5f\x2d6b36063d772b-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:31:39.559199 kubelet[1471]: E1213 14:31:39.559168 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:39.629961 kubelet[1471]: I1213 14:31:39.629915 1471 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-vq4n9\" (UniqueName: \"kubernetes.io/projected/ebfc6ec8-5534-4535-ab5f-6b36063d772b-kube-api-access-vq4n9\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.629961 kubelet[1471]: I1213 14:31:39.629959 1471 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-var-lib-calico\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.629961 kubelet[1471]: I1213 14:31:39.629973 1471 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ebfc6ec8-5534-4535-ab5f-6b36063d772b-node-certs\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.630212 kubelet[1471]: I1213 14:31:39.629982 1471 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-lib-modules\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.630212 kubelet[1471]: I1213 14:31:39.629993 1471 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ebfc6ec8-5534-4535-ab5f-6b36063d772b-tigera-ca-bundle\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.630212 kubelet[1471]: I1213 14:31:39.630003 1471 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-flexvol-driver-host\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.630212 kubelet[1471]: I1213 14:31:39.630012 1471 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ebfc6ec8-5534-4535-ab5f-6b36063d772b-cni-bin-dir\") on node \"10.0.0.141\" DevicePath \"\"" Dec 13 14:31:39.822068 kubelet[1471]: E1213 14:31:39.821949 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:39.822477 env[1206]: time="2024-12-13T14:31:39.822430815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fmbmw,Uid:79fb70a1-5228-4273-a818-917726f23298,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:39.834544 env[1206]: time="2024-12-13T14:31:39.834476225Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:39.834544 env[1206]: time="2024-12-13T14:31:39.834525838Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:39.834544 env[1206]: time="2024-12-13T14:31:39.834536679Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:39.834745 env[1206]: time="2024-12-13T14:31:39.834675630Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22 pid=2443 runtime=io.containerd.runc.v2 Dec 13 14:31:39.843508 systemd[1]: Started cri-containerd-8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22.scope. Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.861587 kernel: audit: type=1400 audit(1734100299.853:548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.861639 kernel: audit: type=1400 audit(1734100299.853:549): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.861659 kernel: audit: type=1400 audit(1734100299.853:550): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.868514 kernel: audit: type=1400 audit(1734100299.853:551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.868557 kernel: audit: type=1400 audit(1734100299.853:552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.874794 kernel: audit: type=1400 audit(1734100299.853:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.874835 kernel: audit: type=1400 audit(1734100299.853:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877936 kernel: audit: type=1400 audit(1734100299.853:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit: BPF prog-id=84 op=LOAD Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2443 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656536613436653862306434346362373533353431656561366332 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2443 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656536613436653862306434346362373533353431656561366332 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.860000 audit: BPF prog-id=85 op=LOAD Dec 13 14:31:39.860000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185620 items=0 ppid=2443 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656536613436653862306434346362373533353431656561366332 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.863000 audit: BPF prog-id=86 op=LOAD Dec 13 14:31:39.863000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185668 items=0 ppid=2443 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656536613436653862306434346362373533353431656561366332 Dec 13 14:31:39.870000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:31:39.870000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.870000 audit: BPF prog-id=87 op=LOAD Dec 13 14:31:39.870000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185a78 items=0 ppid=2443 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865656536613436653862306434346362373533353431656561366332 Dec 13 14:31:39.891161 env[1206]: time="2024-12-13T14:31:39.891083384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fmbmw,Uid:79fb70a1-5228-4273-a818-917726f23298,Namespace:calico-system,Attempt:0,} returns sandbox id \"8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22\"" Dec 13 14:31:39.891899 kubelet[1471]: E1213 14:31:39.891873 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:39.893447 env[1206]: time="2024-12-13T14:31:39.893411354Z" level=info msg="CreateContainer within sandbox \"8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:31:39.909457 env[1206]: time="2024-12-13T14:31:39.909411434Z" level=info msg="CreateContainer within sandbox \"8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f56ee001b46ac498d58b311a1b063e2fc11c4a965d4b9bc49532e1924f1e7dc7\"" Dec 13 14:31:39.909996 env[1206]: time="2024-12-13T14:31:39.909942633Z" level=info msg="StartContainer for \"f56ee001b46ac498d58b311a1b063e2fc11c4a965d4b9bc49532e1924f1e7dc7\"" Dec 13 14:31:39.924872 systemd[1]: Started cri-containerd-f56ee001b46ac498d58b311a1b063e2fc11c4a965d4b9bc49532e1924f1e7dc7.scope. Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fedf34c0c28 items=0 ppid=2443 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635366565303031623436616334393864353862333131613162303633 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit: BPF prog-id=88 op=LOAD Dec 13 14:31:39.937000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6cd8 items=0 ppid=2443 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635366565303031623436616334393864353862333131613162303633 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit: BPF prog-id=89 op=LOAD Dec 13 14:31:39.937000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6d28 items=0 ppid=2443 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635366565303031623436616334393864353862333131613162303633 Dec 13 14:31:39.937000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:31:39.937000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit: BPF prog-id=90 op=LOAD Dec 13 14:31:39.937000 audit[2485]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6db8 items=0 ppid=2443 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635366565303031623436616334393864353862333131613162303633 Dec 13 14:31:39.950978 env[1206]: time="2024-12-13T14:31:39.950933204Z" level=info msg="StartContainer for \"f56ee001b46ac498d58b311a1b063e2fc11c4a965d4b9bc49532e1924f1e7dc7\" returns successfully" Dec 13 14:31:39.960197 systemd[1]: cri-containerd-f56ee001b46ac498d58b311a1b063e2fc11c4a965d4b9bc49532e1924f1e7dc7.scope: Deactivated successfully. Dec 13 14:31:39.965000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:31:39.996419 env[1206]: time="2024-12-13T14:31:39.996361494Z" level=info msg="shim disconnected" id=f56ee001b46ac498d58b311a1b063e2fc11c4a965d4b9bc49532e1924f1e7dc7 Dec 13 14:31:39.996419 env[1206]: time="2024-12-13T14:31:39.996413192Z" level=warning msg="cleaning up after shim disconnected" id=f56ee001b46ac498d58b311a1b063e2fc11c4a965d4b9bc49532e1924f1e7dc7 namespace=k8s.io Dec 13 14:31:39.996419 env[1206]: time="2024-12-13T14:31:39.996424724Z" level=info msg="cleaning up dead shim" Dec 13 14:31:40.003190 env[1206]: time="2024-12-13T14:31:40.003144053Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2523 runtime=io.containerd.runc.v2\n" Dec 13 14:31:40.124756 systemd[1]: Removed slice kubepods-besteffort-podebfc6ec8_5534_4535_ab5f_6b36063d772b.slice. Dec 13 14:31:40.223449 kubelet[1471]: I1213 14:31:40.223418 1471 scope.go:117] "RemoveContainer" containerID="1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609" Dec 13 14:31:40.224889 env[1206]: time="2024-12-13T14:31:40.224699143Z" level=info msg="RemoveContainer for \"1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609\"" Dec 13 14:31:40.226274 kubelet[1471]: E1213 14:31:40.226241 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:40.228096 env[1206]: time="2024-12-13T14:31:40.228025710Z" level=info msg="CreateContainer within sandbox \"8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:31:40.228225 env[1206]: time="2024-12-13T14:31:40.228097245Z" level=info msg="RemoveContainer for \"1c1a2ecb5b420fd1909d3d3347221567d8b8d1f6f6185c4294728423bbf82609\" returns successfully" Dec 13 14:31:40.228305 kubelet[1471]: I1213 14:31:40.228271 1471 scope.go:117] "RemoveContainer" containerID="64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47" Dec 13 14:31:40.230216 env[1206]: time="2024-12-13T14:31:40.230188498Z" level=info msg="RemoveContainer for \"64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47\"" Dec 13 14:31:40.236488 env[1206]: time="2024-12-13T14:31:40.236426982Z" level=info msg="RemoveContainer for \"64e071f3a55a6b8e8f08636e53e11587b376ae88de0f6dd000dd8d7b8a86ae47\" returns successfully" Dec 13 14:31:40.236700 kubelet[1471]: I1213 14:31:40.236673 1471 scope.go:117] "RemoveContainer" containerID="52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b" Dec 13 14:31:40.238305 env[1206]: time="2024-12-13T14:31:40.238265991Z" level=info msg="RemoveContainer for \"52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b\"" Dec 13 14:31:40.242681 env[1206]: time="2024-12-13T14:31:40.242632864Z" level=info msg="RemoveContainer for \"52fce46e5486bb984759626376494427c2af1be3a60356fe864e23d7b59e3d9b\" returns successfully" Dec 13 14:31:40.248051 env[1206]: time="2024-12-13T14:31:40.247972497Z" level=info msg="CreateContainer within sandbox \"8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd\"" Dec 13 14:31:40.248649 env[1206]: time="2024-12-13T14:31:40.248620164Z" level=info msg="StartContainer for \"c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd\"" Dec 13 14:31:40.262687 systemd[1]: Started cri-containerd-c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd.scope. Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f737c389018 items=0 ppid=2443 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346332396335633133643834366134656134316238306161396662 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit: BPF prog-id=91 op=LOAD Dec 13 14:31:40.274000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003886e8 items=0 ppid=2443 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346332396335633133643834366134656134316238306161396662 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit: BPF prog-id=92 op=LOAD Dec 13 14:31:40.274000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000388738 items=0 ppid=2443 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346332396335633133643834366134656134316238306161396662 Dec 13 14:31:40.274000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:31:40.274000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.274000 audit: BPF prog-id=93 op=LOAD Dec 13 14:31:40.274000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003887c8 items=0 ppid=2443 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346332396335633133643834366134656134316238306161396662 Dec 13 14:31:40.290334 env[1206]: time="2024-12-13T14:31:40.290282705Z" level=info msg="StartContainer for \"c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd\" returns successfully" Dec 13 14:31:40.547547 env[1206]: time="2024-12-13T14:31:40.546346590Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 14:31:40.548762 systemd[1]: cri-containerd-c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd.scope: Deactivated successfully. Dec 13 14:31:40.553000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:31:40.559540 kubelet[1471]: E1213 14:31:40.559508 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:40.564381 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd-rootfs.mount: Deactivated successfully. Dec 13 14:31:40.571658 env[1206]: time="2024-12-13T14:31:40.571623812Z" level=info msg="shim disconnected" id=c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd Dec 13 14:31:40.571658 env[1206]: time="2024-12-13T14:31:40.571657065Z" level=warning msg="cleaning up after shim disconnected" id=c94c29c5c13d846a4ea41b80aa9fbd4c1c4da78b60ff44ef553e489e1a0395fd namespace=k8s.io Dec 13 14:31:40.571768 env[1206]: time="2024-12-13T14:31:40.571666532Z" level=info msg="cleaning up dead shim" Dec 13 14:31:40.577441 env[1206]: time="2024-12-13T14:31:40.577408853Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2589 runtime=io.containerd.runc.v2\n" Dec 13 14:31:41.231525 kubelet[1471]: E1213 14:31:41.229514 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:41.239597 env[1206]: time="2024-12-13T14:31:41.239553531Z" level=info msg="CreateContainer within sandbox \"8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:31:41.251664 env[1206]: time="2024-12-13T14:31:41.251606838Z" level=info msg="CreateContainer within sandbox \"8eee6a46e8b0d44cb753541eea6c22f910bf263b22e48fe8025a7833e636dc22\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4989e5edec2ffc3971916353dfb53844ddcc6b9eae9fc5b38fe354eb0097ebda\"" Dec 13 14:31:41.252064 env[1206]: time="2024-12-13T14:31:41.252027760Z" level=info msg="StartContainer for \"4989e5edec2ffc3971916353dfb53844ddcc6b9eae9fc5b38fe354eb0097ebda\"" Dec 13 14:31:41.265671 systemd[1]: Started cri-containerd-4989e5edec2ffc3971916353dfb53844ddcc6b9eae9fc5b38fe354eb0097ebda.scope. Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd7d56b8978 items=0 ppid=2443 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383965356564656332666663333937313931363335336466623533 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit: BPF prog-id=94 op=LOAD Dec 13 14:31:41.284000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032bbd8 items=0 ppid=2443 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383965356564656332666663333937313931363335336466623533 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit: BPF prog-id=95 op=LOAD Dec 13 14:31:41.284000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032bc28 items=0 ppid=2443 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383965356564656332666663333937313931363335336466623533 Dec 13 14:31:41.284000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:31:41.284000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.284000 audit: BPF prog-id=96 op=LOAD Dec 13 14:31:41.284000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032bcb8 items=0 ppid=2443 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383965356564656332666663333937313931363335336466623533 Dec 13 14:31:41.300085 env[1206]: time="2024-12-13T14:31:41.300050065Z" level=info msg="StartContainer for \"4989e5edec2ffc3971916353dfb53844ddcc6b9eae9fc5b38fe354eb0097ebda\" returns successfully" Dec 13 14:31:41.560624 kubelet[1471]: E1213 14:31:41.560507 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:42.122065 kubelet[1471]: I1213 14:31:42.122017 1471 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="ebfc6ec8-5534-4535-ab5f-6b36063d772b" path="/var/lib/kubelet/pods/ebfc6ec8-5534-4535-ab5f-6b36063d772b/volumes" Dec 13 14:31:42.236796 kubelet[1471]: E1213 14:31:42.236765 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:42.289031 kubelet[1471]: I1213 14:31:42.288971 1471 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-fmbmw" podStartSLOduration=3.288952122 podStartE2EDuration="3.288952122s" podCreationTimestamp="2024-12-13 14:31:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:42.288888904 +0000 UTC m=+49.017788367" watchObservedRunningTime="2024-12-13 14:31:42.288952122 +0000 UTC m=+49.017851565" Dec 13 14:31:42.543000 audit[2751]: AVC avc: denied { write } for pid=2751 comm="tee" name="fd" dev="proc" ino=21887 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:42.543000 audit[2751]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeadedba25 a2=241 a3=1b6 items=1 ppid=2708 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.543000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:31:42.543000 audit: PATH item=0 name="/dev/fd/63" inode=21884 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:42.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:42.545000 audit[2749]: AVC avc: denied { write } for pid=2749 comm="tee" name="fd" dev="proc" ino=22746 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:42.545000 audit[2749]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb66a5a16 a2=241 a3=1b6 items=1 ppid=2703 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.545000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:31:42.545000 audit: PATH item=0 name="/dev/fd/63" inode=21881 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:42.545000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:42.547000 audit[2760]: AVC avc: denied { write } for pid=2760 comm="tee" name="fd" dev="proc" ino=21894 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:42.547000 audit[2760]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde37caa26 a2=241 a3=1b6 items=1 ppid=2711 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.547000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:31:42.547000 audit: PATH item=0 name="/dev/fd/63" inode=21891 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:42.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:42.548000 audit[2746]: AVC avc: denied { write } for pid=2746 comm="tee" name="fd" dev="proc" ino=22750 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:42.548000 audit[2746]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc020c2a25 a2=241 a3=1b6 items=1 ppid=2695 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.548000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:31:42.548000 audit: PATH item=0 name="/dev/fd/63" inode=22742 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:42.548000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:42.550000 audit[2759]: AVC avc: denied { write } for pid=2759 comm="tee" name="fd" dev="proc" ino=21898 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:42.550000 audit[2759]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd985b3a27 a2=241 a3=1b6 items=1 ppid=2696 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.550000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:31:42.550000 audit: PATH item=0 name="/dev/fd/63" inode=20889 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:42.550000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:42.553000 audit[2763]: AVC avc: denied { write } for pid=2763 comm="tee" name="fd" dev="proc" ino=21902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:42.553000 audit[2763]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8d138a25 a2=241 a3=1b6 items=1 ppid=2700 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.553000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:31:42.553000 audit: PATH item=0 name="/dev/fd/63" inode=20890 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:42.553000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:42.555000 audit[2769]: AVC avc: denied { write } for pid=2769 comm="tee" name="fd" dev="proc" ino=21908 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:42.555000 audit[2769]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb126ea15 a2=241 a3=1b6 items=1 ppid=2699 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.555000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:31:42.555000 audit: PATH item=0 name="/dev/fd/63" inode=20342 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:42.555000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:42.561537 kubelet[1471]: E1213 14:31:42.561478 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit: BPF prog-id=97 op=LOAD Dec 13 14:31:42.915000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3d3ea540 a2=98 a3=3 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.915000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:42.915000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit: BPF prog-id=98 op=LOAD Dec 13 14:31:42.915000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3d3ea320 a2=74 a3=540051 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.915000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:42.915000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:42.915000 audit: BPF prog-id=99 op=LOAD Dec 13 14:31:42.915000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3d3ea350 a2=94 a3=2 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:42.915000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:42.915000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.021000 audit: BPF prog-id=100 op=LOAD Dec 13 14:31:43.021000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3d3ea210 a2=40 a3=1 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.021000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.022000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:31:43.022000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.022000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc3d3ea2e0 a2=50 a3=7ffc3d3ea3c0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.022000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.029000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.029000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3d3ea220 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.029000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d3ea250 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d3ea160 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3d3ea270 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3d3ea250 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3d3ea240 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3d3ea270 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d3ea250 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d3ea270 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d3ea240 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3d3ea2b0 a2=28 a3=0 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3d3ea060 a2=50 a3=1 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit: BPF prog-id=101 op=LOAD Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3d3ea060 a2=94 a3=5 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3d3ea110 a2=50 a3=1 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc3d3ea230 a2=4 a3=38 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { confidentiality } for pid=2814 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3d3ea280 a2=94 a3=6 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { confidentiality } for pid=2814 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3d3e9a30 a2=94 a3=83 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.030000 audit[2814]: AVC avc: denied { confidentiality } for pid=2814 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.030000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3d3e9a30 a2=94 a3=83 items=0 ppid=2697 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.030000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit: BPF prog-id=102 op=LOAD Dec 13 14:31:43.037000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec8a421a0 a2=98 a3=1999999999999999 items=0 ppid=2697 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.037000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:43.037000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit: BPF prog-id=103 op=LOAD Dec 13 14:31:43.037000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec8a42080 a2=74 a3=ffff items=0 ppid=2697 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.037000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:43.037000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.037000 audit: BPF prog-id=104 op=LOAD Dec 13 14:31:43.037000 audit[2817]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec8a420c0 a2=40 a3=7ffec8a422a0 items=0 ppid=2697 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.037000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:43.037000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:31:43.089653 systemd-networkd[1038]: vxlan.calico: Link UP Dec 13 14:31:43.089661 systemd-networkd[1038]: vxlan.calico: Gained carrier Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit: BPF prog-id=105 op=LOAD Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4a375c50 a2=98 a3=ffffffff items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit: BPF prog-id=106 op=LOAD Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4a375a60 a2=74 a3=540051 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit: BPF prog-id=107 op=LOAD Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4a375a90 a2=94 a3=2 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4a375960 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4a375990 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4a3758a0 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4a3759b0 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4a375990 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.106000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.106000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4a375980 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.106000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.107000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.107000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4a3759b0 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.107000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.107000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4a375990 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4a3759b0 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4a375980 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4a3759f0 a2=28 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit: BPF prog-id=108 op=LOAD Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4a375860 a2=40 a3=0 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe4a375850 a2=50 a3=2800 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe4a375850 a2=50 a3=2800 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit: BPF prog-id=109 op=LOAD Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4a375070 a2=94 a3=2 items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.108000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.108000 audit: BPF prog-id=110 op=LOAD Dec 13 14:31:43.108000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4a375170 a2=94 a3=2d items=0 ppid=2697 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit: BPF prog-id=111 op=LOAD Dec 13 14:31:43.113000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2b13dbf0 a2=98 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.113000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.113000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit: BPF prog-id=112 op=LOAD Dec 13 14:31:43.113000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2b13d9d0 a2=74 a3=540051 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.113000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.113000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.113000 audit: BPF prog-id=113 op=LOAD Dec 13 14:31:43.113000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2b13da00 a2=94 a3=2 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.113000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.113000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit: BPF prog-id=114 op=LOAD Dec 13 14:31:43.216000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2b13d8c0 a2=40 a3=1 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.216000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.216000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:31:43.216000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.216000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc2b13d990 a2=50 a3=7ffc2b13da70 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.216000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2b13d8d0 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b13d900 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b13d810 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2b13d920 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2b13d900 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2b13d8f0 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2b13d920 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b13d900 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b13d920 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b13d8f0 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2b13d960 a2=28 a3=0 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2b13d710 a2=50 a3=1 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit: BPF prog-id=115 op=LOAD Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2b13d710 a2=94 a3=5 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2b13d7c0 a2=50 a3=1 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc2b13d8e0 a2=4 a3=38 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.225000 audit[2849]: AVC avc: denied { confidentiality } for pid=2849 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.225000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2b13d930 a2=94 a3=6 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.225000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { confidentiality } for pid=2849 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.226000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2b13d0e0 a2=94 a3=83 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { confidentiality } for pid=2849 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.226000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2b13d0e0 a2=94 a3=83 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2b13eb20 a2=10 a3=208 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2b13e9c0 a2=10 a3=3 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2b13e960 a2=10 a3=3 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.226000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.226000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2b13e960 a2=10 a3=7 items=0 ppid=2697 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.234000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:31:43.237958 kubelet[1471]: E1213 14:31:43.237938 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:43.283000 audit[2897]: NETFILTER_CFG table=nat:65 family=2 entries=15 op=nft_register_chain pid=2897 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.283000 audit[2897]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff51464e10 a2=0 a3=7fff51464dfc items=0 ppid=2697 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.283000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:43.284000 audit[2898]: NETFILTER_CFG table=mangle:66 family=2 entries=16 op=nft_register_chain pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.284000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd3859ae10 a2=0 a3=7ffd3859adfc items=0 ppid=2697 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:43.296000 audit[2900]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.296000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc060c9dd0 a2=0 a3=7ffc060c9dbc items=0 ppid=2697 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.296000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:43.302000 audit[2896]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.302000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc97d63ca0 a2=0 a3=7ffc97d63c8c items=0 ppid=2697 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.302000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:43.562641 kubelet[1471]: E1213 14:31:43.562517 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:44.120274 env[1206]: time="2024-12-13T14:31:44.120225559Z" level=info msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.153 [INFO][2924] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.153 [INFO][2924] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" iface="eth0" netns="/var/run/netns/cni-75e13714-82ab-4e44-e75b-bfc30baed20f" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.153 [INFO][2924] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" iface="eth0" netns="/var/run/netns/cni-75e13714-82ab-4e44-e75b-bfc30baed20f" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.154 [INFO][2924] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" iface="eth0" netns="/var/run/netns/cni-75e13714-82ab-4e44-e75b-bfc30baed20f" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.154 [INFO][2924] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.154 [INFO][2924] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.171 [INFO][2931] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.171 [INFO][2931] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.171 [INFO][2931] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.176 [WARNING][2931] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.176 [INFO][2931] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.177 [INFO][2931] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:44.181119 env[1206]: 2024-12-13 14:31:44.179 [INFO][2924] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:44.181772 env[1206]: time="2024-12-13T14:31:44.181731906Z" level=info msg="TearDown network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" successfully" Dec 13 14:31:44.181772 env[1206]: time="2024-12-13T14:31:44.181768374Z" level=info msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" returns successfully" Dec 13 14:31:44.182349 env[1206]: time="2024-12-13T14:31:44.182316755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qs4q7,Uid:5ee7ee55-035d-43e6-b502-e8c906818c5f,Namespace:default,Attempt:1,}" Dec 13 14:31:44.183556 systemd[1]: run-netns-cni\x2d75e13714\x2d82ab\x2d4e44\x2de75b\x2dbfc30baed20f.mount: Deactivated successfully. Dec 13 14:31:44.277468 systemd-networkd[1038]: cali51928236422: Link UP Dec 13 14:31:44.279958 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:44.280069 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali51928236422: link becomes ready Dec 13 14:31:44.280128 systemd-networkd[1038]: cali51928236422: Gained carrier Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.223 [INFO][2939] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0 nginx-deployment-8587fbcb89- default 5ee7ee55-035d-43e6-b502-e8c906818c5f 1079 0 2024-12-13 14:31:10 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.141 nginx-deployment-8587fbcb89-qs4q7 eth0 default [] [] [kns.default ksa.default.default] cali51928236422 [] []}} ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.223 [INFO][2939] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.245 [INFO][2952] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" HandleID="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.252 [INFO][2952] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" HandleID="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027df60), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.141", "pod":"nginx-deployment-8587fbcb89-qs4q7", "timestamp":"2024-12-13 14:31:44.245299387 +0000 UTC"}, Hostname:"10.0.0.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.252 [INFO][2952] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.252 [INFO][2952] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.252 [INFO][2952] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.141' Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.254 [INFO][2952] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.257 [INFO][2952] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.260 [INFO][2952] ipam/ipam.go 489: Trying affinity for 192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.262 [INFO][2952] ipam/ipam.go 155: Attempting to load block cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.264 [INFO][2952] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.264 [INFO][2952] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.117.128/26 handle="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.265 [INFO][2952] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90 Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.270 [INFO][2952] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.117.128/26 handle="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.274 [INFO][2952] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.117.129/26] block=192.168.117.128/26 handle="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.274 [INFO][2952] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.117.129/26] handle="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" host="10.0.0.141" Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.274 [INFO][2952] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:44.288568 env[1206]: 2024-12-13 14:31:44.274 [INFO][2952] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.129/26] IPv6=[] ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" HandleID="k8s-pod-network.21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.289123 env[1206]: 2024-12-13 14:31:44.275 [INFO][2939] cni-plugin/k8s.go 386: Populated endpoint ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5ee7ee55-035d-43e6-b502-e8c906818c5f", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-qs4q7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali51928236422", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:44.289123 env[1206]: 2024-12-13 14:31:44.275 [INFO][2939] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.117.129/32] ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.289123 env[1206]: 2024-12-13 14:31:44.275 [INFO][2939] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali51928236422 ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.289123 env[1206]: 2024-12-13 14:31:44.280 [INFO][2939] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.289123 env[1206]: 2024-12-13 14:31:44.280 [INFO][2939] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5ee7ee55-035d-43e6-b502-e8c906818c5f", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90", Pod:"nginx-deployment-8587fbcb89-qs4q7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali51928236422", MAC:"9e:1f:19:34:cf:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:44.289123 env[1206]: 2024-12-13 14:31:44.286 [INFO][2939] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90" Namespace="default" Pod="nginx-deployment-8587fbcb89-qs4q7" WorkloadEndpoint="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:44.298741 env[1206]: time="2024-12-13T14:31:44.298637440Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:44.298741 env[1206]: time="2024-12-13T14:31:44.298714776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:44.298741 env[1206]: time="2024-12-13T14:31:44.298733341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:44.298894 env[1206]: time="2024-12-13T14:31:44.298861111Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90 pid=2981 runtime=io.containerd.runc.v2 Dec 13 14:31:44.298000 audit[2989]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:44.298000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffe7369bf20 a2=0 a3=7ffe7369bf0c items=0 ppid=2697 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.298000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:44.310026 systemd[1]: Started cri-containerd-21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90.scope. Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.316000 audit: BPF prog-id=116 op=LOAD Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2981 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633862323165616638303561303065383363383839336531326162 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2981 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633862323165616638303561303065383363383839336531326162 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit: BPF prog-id=117 op=LOAD Dec 13 14:31:44.317000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a30c0 items=0 ppid=2981 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633862323165616638303561303065383363383839336531326162 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit: BPF prog-id=118 op=LOAD Dec 13 14:31:44.317000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a3108 items=0 ppid=2981 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633862323165616638303561303065383363383839336531326162 Dec 13 14:31:44.317000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:31:44.317000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.317000 audit: BPF prog-id=119 op=LOAD Dec 13 14:31:44.317000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a3518 items=0 ppid=2981 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633862323165616638303561303065383363383839336531326162 Dec 13 14:31:44.319809 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:44.340390 env[1206]: time="2024-12-13T14:31:44.340341166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qs4q7,Uid:5ee7ee55-035d-43e6-b502-e8c906818c5f,Namespace:default,Attempt:1,} returns sandbox id \"21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90\"" Dec 13 14:31:44.341728 env[1206]: time="2024-12-13T14:31:44.341703778Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:31:44.563242 kubelet[1471]: E1213 14:31:44.563109 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:44.954724 systemd-networkd[1038]: vxlan.calico: Gained IPv6LL Dec 13 14:31:45.564169 kubelet[1471]: E1213 14:31:45.564134 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:45.722679 systemd-networkd[1038]: cali51928236422: Gained IPv6LL Dec 13 14:31:46.564576 kubelet[1471]: E1213 14:31:46.564528 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:46.671000 audit[3019]: NETFILTER_CFG table=filter:70 family=2 entries=16 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.673750 kernel: kauditd_printk_skb: 755 callbacks suppressed Dec 13 14:31:46.673803 kernel: audit: type=1325 audit(1734100306.671:707): table=filter:70 family=2 entries=16 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.671000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff14f7f7c0 a2=0 a3=7fff14f7f7ac items=0 ppid=1627 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.682392 kernel: audit: type=1300 audit(1734100306.671:707): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff14f7f7c0 a2=0 a3=7fff14f7f7ac items=0 ppid=1627 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.682458 kernel: audit: type=1327 audit(1734100306.671:707): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.678000 audit[3019]: NETFILTER_CFG table=nat:71 family=2 entries=14 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.687792 kernel: audit: type=1325 audit(1734100306.678:708): table=nat:71 family=2 entries=14 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.687835 kernel: audit: type=1300 audit(1734100306.678:708): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff14f7f7c0 a2=0 a3=0 items=0 ppid=1627 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.678000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff14f7f7c0 a2=0 a3=0 items=0 ppid=1627 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.696428 kernel: audit: type=1327 audit(1734100306.678:708): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.704000 audit[3021]: NETFILTER_CFG table=filter:72 family=2 entries=13 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.704000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcaf3081c0 a2=0 a3=7ffcaf3081ac items=0 ppid=1627 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.714128 kernel: audit: type=1325 audit(1734100306.704:709): table=filter:72 family=2 entries=13 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.714184 kernel: audit: type=1300 audit(1734100306.704:709): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcaf3081c0 a2=0 a3=7ffcaf3081ac items=0 ppid=1627 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.714222 kernel: audit: type=1327 audit(1734100306.704:709): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.725000 audit[3021]: NETFILTER_CFG table=nat:73 family=2 entries=47 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.725000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcaf3081c0 a2=0 a3=7ffcaf3081ac items=0 ppid=1627 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.729539 kernel: audit: type=1325 audit(1734100306.725:710): table=nat:73 family=2 entries=47 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:47.121158 env[1206]: time="2024-12-13T14:31:47.121118920Z" level=info msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.159 [INFO][3041] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.159 [INFO][3041] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" iface="eth0" netns="/var/run/netns/cni-809bc742-27dd-41bb-a6c1-3a4ca4502284" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.159 [INFO][3041] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" iface="eth0" netns="/var/run/netns/cni-809bc742-27dd-41bb-a6c1-3a4ca4502284" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.159 [INFO][3041] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" iface="eth0" netns="/var/run/netns/cni-809bc742-27dd-41bb-a6c1-3a4ca4502284" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.160 [INFO][3041] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.160 [INFO][3041] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.177 [INFO][3048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.177 [INFO][3048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.177 [INFO][3048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.182 [WARNING][3048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.182 [INFO][3048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.183 [INFO][3048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:47.186182 env[1206]: 2024-12-13 14:31:47.185 [INFO][3041] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:47.186631 env[1206]: time="2024-12-13T14:31:47.186349959Z" level=info msg="TearDown network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" successfully" Dec 13 14:31:47.186631 env[1206]: time="2024-12-13T14:31:47.186382581Z" level=info msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" returns successfully" Dec 13 14:31:47.188122 systemd[1]: run-netns-cni\x2d809bc742\x2d27dd\x2d41bb\x2da6c1\x2d3a4ca4502284.mount: Deactivated successfully. Dec 13 14:31:47.189166 env[1206]: time="2024-12-13T14:31:47.189119813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zk2cr,Uid:89cc47c1-7354-46a5-8a7c-c38f4a67c0a6,Namespace:calico-system,Attempt:1,}" Dec 13 14:31:47.331686 systemd-networkd[1038]: cali51a4f57bc35: Link UP Dec 13 14:31:47.334708 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:47.335577 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali51a4f57bc35: link becomes ready Dec 13 14:31:47.334967 systemd-networkd[1038]: cali51a4f57bc35: Gained carrier Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.266 [INFO][3057] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.141-k8s-csi--node--driver--zk2cr-eth0 csi-node-driver- calico-system 89cc47c1-7354-46a5-8a7c-c38f4a67c0a6 1133 0 2024-12-13 14:30:54 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.141 csi-node-driver-zk2cr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali51a4f57bc35 [] []}} ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.266 [INFO][3057] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.294 [INFO][3069] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" HandleID="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.303 [INFO][3069] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" HandleID="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ebc0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.141", "pod":"csi-node-driver-zk2cr", "timestamp":"2024-12-13 14:31:47.294329646 +0000 UTC"}, Hostname:"10.0.0.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.303 [INFO][3069] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.303 [INFO][3069] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.303 [INFO][3069] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.141' Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.306 [INFO][3069] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.310 [INFO][3069] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.314 [INFO][3069] ipam/ipam.go 489: Trying affinity for 192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.316 [INFO][3069] ipam/ipam.go 155: Attempting to load block cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.318 [INFO][3069] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.318 [INFO][3069] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.117.128/26 handle="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.319 [INFO][3069] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4 Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.323 [INFO][3069] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.117.128/26 handle="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.328 [INFO][3069] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.117.130/26] block=192.168.117.128/26 handle="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.328 [INFO][3069] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.117.130/26] handle="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" host="10.0.0.141" Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.328 [INFO][3069] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:47.364256 env[1206]: 2024-12-13 14:31:47.328 [INFO][3069] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.130/26] IPv6=[] ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" HandleID="k8s-pod-network.cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.364839 env[1206]: 2024-12-13 14:31:47.329 [INFO][3057] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-csi--node--driver--zk2cr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"", Pod:"csi-node-driver-zk2cr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.117.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali51a4f57bc35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:47.364839 env[1206]: 2024-12-13 14:31:47.329 [INFO][3057] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.117.130/32] ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.364839 env[1206]: 2024-12-13 14:31:47.329 [INFO][3057] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali51a4f57bc35 ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.364839 env[1206]: 2024-12-13 14:31:47.334 [INFO][3057] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.364839 env[1206]: 2024-12-13 14:31:47.335 [INFO][3057] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-csi--node--driver--zk2cr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4", Pod:"csi-node-driver-zk2cr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.117.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali51a4f57bc35", MAC:"fe:12:dc:04:04:5c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:47.364839 env[1206]: 2024-12-13 14:31:47.361 [INFO][3057] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4" Namespace="calico-system" Pod="csi-node-driver-zk2cr" WorkloadEndpoint="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:47.370000 audit[3090]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_chain pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:47.370000 audit[3090]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff1085f0c0 a2=0 a3=7fff1085f0ac items=0 ppid=2697 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.370000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:47.461655 env[1206]: time="2024-12-13T14:31:47.461587889Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:47.461817 env[1206]: time="2024-12-13T14:31:47.461635539Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:47.461817 env[1206]: time="2024-12-13T14:31:47.461646299Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:47.461906 env[1206]: time="2024-12-13T14:31:47.461815978Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4 pid=3098 runtime=io.containerd.runc.v2 Dec 13 14:31:47.471997 systemd[1]: Started cri-containerd-cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4.scope. Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit: BPF prog-id=120 op=LOAD Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613362303866663630633037353433643039626562346562346361 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613362303866663630633037353433643039626562346562346361 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit: BPF prog-id=121 op=LOAD Dec 13 14:31:47.479000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00025dd90 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613362303866663630633037353433643039626562346562346361 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.479000 audit: BPF prog-id=122 op=LOAD Dec 13 14:31:47.479000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00025ddd8 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613362303866663630633037353433643039626562346562346361 Dec 13 14:31:47.480000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:31:47.480000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:47.480000 audit: BPF prog-id=123 op=LOAD Dec 13 14:31:47.480000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b81e8 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613362303866663630633037353433643039626562346562346361 Dec 13 14:31:47.482167 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:47.490408 env[1206]: time="2024-12-13T14:31:47.490372010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zk2cr,Uid:89cc47c1-7354-46a5-8a7c-c38f4a67c0a6,Namespace:calico-system,Attempt:1,} returns sandbox id \"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4\"" Dec 13 14:31:47.565319 kubelet[1471]: E1213 14:31:47.565256 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:48.091266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1291244234.mount: Deactivated successfully. Dec 13 14:31:48.565788 kubelet[1471]: E1213 14:31:48.565651 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:49.370733 systemd-networkd[1038]: cali51a4f57bc35: Gained IPv6LL Dec 13 14:31:49.566418 kubelet[1471]: E1213 14:31:49.566356 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:49.730100 env[1206]: time="2024-12-13T14:31:49.729935631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.731829 env[1206]: time="2024-12-13T14:31:49.731799623Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.733594 env[1206]: time="2024-12-13T14:31:49.733548718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.735129 env[1206]: time="2024-12-13T14:31:49.735100052Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.735868 env[1206]: time="2024-12-13T14:31:49.735834702Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:31:49.737077 env[1206]: time="2024-12-13T14:31:49.737043292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:31:49.738623 env[1206]: time="2024-12-13T14:31:49.738586871Z" level=info msg="CreateContainer within sandbox \"21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:31:49.751004 env[1206]: time="2024-12-13T14:31:49.750970854Z" level=info msg="CreateContainer within sandbox \"21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"0d3643a8d37ab31fe6aa56fe9adc1c98c9ac052b8ef296c74c2aebf171035631\"" Dec 13 14:31:49.751458 env[1206]: time="2024-12-13T14:31:49.751433012Z" level=info msg="StartContainer for \"0d3643a8d37ab31fe6aa56fe9adc1c98c9ac052b8ef296c74c2aebf171035631\"" Dec 13 14:31:49.765101 systemd[1]: Started cri-containerd-0d3643a8d37ab31fe6aa56fe9adc1c98c9ac052b8ef296c74c2aebf171035631.scope. Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.771000 audit: BPF prog-id=124 op=LOAD Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2981 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333634336138643337616233316665366161353666653961646331 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2981 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333634336138643337616233316665366161353666653961646331 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.772000 audit: BPF prog-id=125 op=LOAD Dec 13 14:31:49.772000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001dcbc0 items=0 ppid=2981 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333634336138643337616233316665366161353666653961646331 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.773000 audit: BPF prog-id=126 op=LOAD Dec 13 14:31:49.773000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001dcc08 items=0 ppid=2981 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333634336138643337616233316665366161353666653961646331 Dec 13 14:31:49.774000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:31:49.774000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.774000 audit: BPF prog-id=127 op=LOAD Dec 13 14:31:49.774000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001dd018 items=0 ppid=2981 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064333634336138643337616233316665366161353666653961646331 Dec 13 14:31:49.791012 env[1206]: time="2024-12-13T14:31:49.790966863Z" level=info msg="StartContainer for \"0d3643a8d37ab31fe6aa56fe9adc1c98c9ac052b8ef296c74c2aebf171035631\" returns successfully" Dec 13 14:31:50.567019 kubelet[1471]: E1213 14:31:50.566970 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:50.679000 audit[3193]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=3193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.679000 audit[3193]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcdbdbd930 a2=0 a3=7ffcdbdbd91c items=0 ppid=1627 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:50.684000 audit[3193]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=3193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.684000 audit[3193]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcdbdbd930 a2=0 a3=7ffcdbdbd91c items=0 ppid=1627 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:50.739000 audit[3195]: NETFILTER_CFG table=filter:77 family=2 entries=9 op=nft_register_rule pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.739000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcdee89d70 a2=0 a3=7ffcdee89d5c items=0 ppid=1627 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:50.744000 audit[3195]: NETFILTER_CFG table=nat:78 family=2 entries=27 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.744000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcdee89d70 a2=0 a3=7ffcdee89d5c items=0 ppid=1627 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:51.567539 kubelet[1471]: E1213 14:31:51.567469 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:51.762000 audit[3197]: NETFILTER_CFG table=filter:79 family=2 entries=8 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:51.767593 kernel: kauditd_printk_skb: 131 callbacks suppressed Dec 13 14:31:51.767662 kernel: audit: type=1325 audit(1734100311.762:752): table=filter:79 family=2 entries=8 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:51.767691 kernel: audit: type=1300 audit(1734100311.762:752): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd4f7517f0 a2=0 a3=7ffd4f7517dc items=0 ppid=1627 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.762000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd4f7517f0 a2=0 a3=7ffd4f7517dc items=0 ppid=1627 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.773214 kernel: audit: type=1327 audit(1734100311.762:752): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:51.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:51.778000 audit[3197]: NETFILTER_CFG table=nat:80 family=2 entries=30 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:51.778000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd4f7517f0 a2=0 a3=7ffd4f7517dc items=0 ppid=1627 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.787515 kernel: audit: type=1325 audit(1734100311.778:753): table=nat:80 family=2 entries=30 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:51.787621 kernel: audit: type=1300 audit(1734100311.778:753): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd4f7517f0 a2=0 a3=7ffd4f7517dc items=0 ppid=1627 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.787652 kernel: audit: type=1327 audit(1734100311.778:753): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:51.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:52.012845 env[1206]: time="2024-12-13T14:31:52.012770324Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:52.023173 env[1206]: time="2024-12-13T14:31:52.023114429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:52.024975 env[1206]: time="2024-12-13T14:31:52.024944195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:52.027204 env[1206]: time="2024-12-13T14:31:52.027171899Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:52.027547 env[1206]: time="2024-12-13T14:31:52.027519652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:31:52.029647 env[1206]: time="2024-12-13T14:31:52.029621669Z" level=info msg="CreateContainer within sandbox \"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:31:52.055521 env[1206]: time="2024-12-13T14:31:52.055459108Z" level=info msg="CreateContainer within sandbox \"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"02e68bc5a2018d854eaac2e88553a38c542c9bfb214d01b228549768feee9ddf\"" Dec 13 14:31:52.056032 env[1206]: time="2024-12-13T14:31:52.055994785Z" level=info msg="StartContainer for \"02e68bc5a2018d854eaac2e88553a38c542c9bfb214d01b228549768feee9ddf\"" Dec 13 14:31:52.073708 systemd[1]: Started cri-containerd-02e68bc5a2018d854eaac2e88553a38c542c9bfb214d01b228549768feee9ddf.scope. Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fcc69052848 items=0 ppid=3098 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.091788 kernel: audit: type=1400 audit(1734100312.082:754): avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.091836 kernel: audit: type=1300 audit(1734100312.082:754): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fcc69052848 items=0 ppid=3098 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032653638626335613230313864383534656161633265383835353361 Dec 13 14:31:52.095971 kernel: audit: type=1327 audit(1734100312.082:754): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032653638626335613230313864383534656161633265383835353361 Dec 13 14:31:52.096011 kernel: audit: type=1400 audit(1734100312.082:755): avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.082000 audit: BPF prog-id=128 op=LOAD Dec 13 14:31:52.082000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00034c2f8 items=0 ppid=3098 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032653638626335613230313864383534656161633265383835353361 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.090000 audit: BPF prog-id=129 op=LOAD Dec 13 14:31:52.090000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00034c348 items=0 ppid=3098 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032653638626335613230313864383534656161633265383835353361 Dec 13 14:31:52.094000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:31:52.094000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.094000 audit: BPF prog-id=130 op=LOAD Dec 13 14:31:52.094000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00034c3d8 items=0 ppid=3098 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032653638626335613230313864383534656161633265383835353361 Dec 13 14:31:52.111636 env[1206]: time="2024-12-13T14:31:52.111579567Z" level=info msg="StartContainer for \"02e68bc5a2018d854eaac2e88553a38c542c9bfb214d01b228549768feee9ddf\" returns successfully" Dec 13 14:31:52.112976 env[1206]: time="2024-12-13T14:31:52.112949038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:31:52.568217 kubelet[1471]: E1213 14:31:52.568167 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:52.697000 audit[3237]: NETFILTER_CFG table=filter:81 family=2 entries=8 op=nft_register_rule pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:52.697000 audit[3237]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffef7900d30 a2=0 a3=7ffef7900d1c items=0 ppid=1627 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:52.702000 audit[3237]: NETFILTER_CFG table=nat:82 family=2 entries=34 op=nft_register_chain pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:52.702000 audit[3237]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffef7900d30 a2=0 a3=7ffef7900d1c items=0 ppid=1627 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.530891 kubelet[1471]: E1213 14:31:53.530794 1471 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:53.568827 kubelet[1471]: E1213 14:31:53.568747 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:53.574087 env[1206]: time="2024-12-13T14:31:53.574047902Z" level=info msg="StopPodSandbox for \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\"" Dec 13 14:31:53.574353 env[1206]: time="2024-12-13T14:31:53.574128854Z" level=info msg="TearDown network for sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" successfully" Dec 13 14:31:53.574353 env[1206]: time="2024-12-13T14:31:53.574161826Z" level=info msg="StopPodSandbox for \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" returns successfully" Dec 13 14:31:53.574512 env[1206]: time="2024-12-13T14:31:53.574458153Z" level=info msg="RemovePodSandbox for \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\"" Dec 13 14:31:53.574578 env[1206]: time="2024-12-13T14:31:53.574505171Z" level=info msg="Forcibly stopping sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\"" Dec 13 14:31:53.574623 env[1206]: time="2024-12-13T14:31:53.574575052Z" level=info msg="TearDown network for sandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" successfully" Dec 13 14:31:53.577320 env[1206]: time="2024-12-13T14:31:53.577274460Z" level=info msg="RemovePodSandbox \"b1f3592feef9121f4bdc2dfcf494548a3c977f7f2d2c62175f08c1a622e8b01b\" returns successfully" Dec 13 14:31:53.577680 env[1206]: time="2024-12-13T14:31:53.577653121Z" level=info msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.618 [WARNING][3259] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5ee7ee55-035d-43e6-b502-e8c906818c5f", ResourceVersion:"1156", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90", Pod:"nginx-deployment-8587fbcb89-qs4q7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali51928236422", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.618 [INFO][3259] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.618 [INFO][3259] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" iface="eth0" netns="" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.618 [INFO][3259] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.618 [INFO][3259] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.636 [INFO][3266] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.636 [INFO][3266] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.637 [INFO][3266] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.644 [WARNING][3266] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.644 [INFO][3266] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.646 [INFO][3266] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:53.648246 env[1206]: 2024-12-13 14:31:53.647 [INFO][3259] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.648729 env[1206]: time="2024-12-13T14:31:53.648270652Z" level=info msg="TearDown network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" successfully" Dec 13 14:31:53.648729 env[1206]: time="2024-12-13T14:31:53.648299366Z" level=info msg="StopPodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" returns successfully" Dec 13 14:31:53.648845 env[1206]: time="2024-12-13T14:31:53.648809864Z" level=info msg="RemovePodSandbox for \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" Dec 13 14:31:53.648894 env[1206]: time="2024-12-13T14:31:53.648850260Z" level=info msg="Forcibly stopping sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\"" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.681 [WARNING][3289] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5ee7ee55-035d-43e6-b502-e8c906818c5f", ResourceVersion:"1156", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"21c8b21eaf805a00e83c8893e12abb9abfa0c860dcaef39fb50e4a442a07cf90", Pod:"nginx-deployment-8587fbcb89-qs4q7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali51928236422", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.682 [INFO][3289] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.682 [INFO][3289] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" iface="eth0" netns="" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.682 [INFO][3289] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.682 [INFO][3289] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.702 [INFO][3296] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.702 [INFO][3296] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.703 [INFO][3296] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.708 [WARNING][3296] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.708 [INFO][3296] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" HandleID="k8s-pod-network.9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Workload="10.0.0.141-k8s-nginx--deployment--8587fbcb89--qs4q7-eth0" Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.709 [INFO][3296] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:53.712263 env[1206]: 2024-12-13 14:31:53.711 [INFO][3289] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131" Dec 13 14:31:53.712732 env[1206]: time="2024-12-13T14:31:53.712336250Z" level=info msg="TearDown network for sandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" successfully" Dec 13 14:31:54.337883 env[1206]: time="2024-12-13T14:31:54.337803937Z" level=info msg="RemovePodSandbox \"9e9fd146f855b33876fac277a9e9fa4932afcefe175340592dc715088689d131\" returns successfully" Dec 13 14:31:54.338330 env[1206]: time="2024-12-13T14:31:54.338305499Z" level=info msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.368 [WARNING][3321] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-csi--node--driver--zk2cr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6", ResourceVersion:"1136", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4", Pod:"csi-node-driver-zk2cr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.117.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali51a4f57bc35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.368 [INFO][3321] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.368 [INFO][3321] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" iface="eth0" netns="" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.369 [INFO][3321] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.369 [INFO][3321] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.387 [INFO][3328] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.387 [INFO][3328] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.387 [INFO][3328] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.392 [WARNING][3328] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.392 [INFO][3328] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.393 [INFO][3328] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:54.395543 env[1206]: 2024-12-13 14:31:54.394 [INFO][3321] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.395543 env[1206]: time="2024-12-13T14:31:54.395569496Z" level=info msg="TearDown network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" successfully" Dec 13 14:31:54.395543 env[1206]: time="2024-12-13T14:31:54.395604543Z" level=info msg="StopPodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" returns successfully" Dec 13 14:31:54.396098 env[1206]: time="2024-12-13T14:31:54.396004012Z" level=info msg="RemovePodSandbox for \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" Dec 13 14:31:54.396098 env[1206]: time="2024-12-13T14:31:54.396026324Z" level=info msg="Forcibly stopping sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\"" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.426 [WARNING][3350] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-csi--node--driver--zk2cr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89cc47c1-7354-46a5-8a7c-c38f4a67c0a6", ResourceVersion:"1136", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4", Pod:"csi-node-driver-zk2cr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.117.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali51a4f57bc35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.426 [INFO][3350] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.426 [INFO][3350] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" iface="eth0" netns="" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.426 [INFO][3350] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.426 [INFO][3350] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.443 [INFO][3357] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.443 [INFO][3357] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.443 [INFO][3357] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.448 [WARNING][3357] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.449 [INFO][3357] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" HandleID="k8s-pod-network.28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Workload="10.0.0.141-k8s-csi--node--driver--zk2cr-eth0" Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.450 [INFO][3357] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:54.452758 env[1206]: 2024-12-13 14:31:54.451 [INFO][3350] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317" Dec 13 14:31:54.453269 env[1206]: time="2024-12-13T14:31:54.452776768Z" level=info msg="TearDown network for sandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" successfully" Dec 13 14:31:54.475079 env[1206]: time="2024-12-13T14:31:54.475036392Z" level=info msg="RemovePodSandbox \"28d1e45cfe87c0155d204c32146d94b4bfa01b2c4f9396eb61528dd0bd55e317\" returns successfully" Dec 13 14:31:54.569166 kubelet[1471]: E1213 14:31:54.569127 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:54.669922 env[1206]: time="2024-12-13T14:31:54.669771151Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.675000 audit[3366]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.675000 audit[3366]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcca73f5c0 a2=0 a3=7ffcca73f5ac items=0 ppid=1627 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.681000 audit[3366]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.681000 audit[3366]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcca73f5c0 a2=0 a3=0 items=0 ppid=1627 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.683751 env[1206]: time="2024-12-13T14:31:54.683697229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.689367 env[1206]: time="2024-12-13T14:31:54.689328051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.693165 env[1206]: time="2024-12-13T14:31:54.693125381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.693477 env[1206]: time="2024-12-13T14:31:54.693451212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:31:54.692000 audit[3368]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=3368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.692000 audit[3368]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd53fa5ab0 a2=0 a3=7ffd53fa5a9c items=0 ppid=1627 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.695535 env[1206]: time="2024-12-13T14:31:54.695484951Z" level=info msg="CreateContainer within sandbox \"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:31:54.696000 audit[3368]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=3368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.696000 audit[3368]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd53fa5ab0 a2=0 a3=0 items=0 ppid=1627 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.696000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.713444 env[1206]: time="2024-12-13T14:31:54.713390501Z" level=info msg="CreateContainer within sandbox \"cea3b08ff60c07543d09beb4eb4cabf7d1f411ca87075a4f1062752734120cb4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f1f44e664d71160991c2b5ba0c64d2c48c14a9fdfefca8f8db711a858b640ef5\"" Dec 13 14:31:54.713893 env[1206]: time="2024-12-13T14:31:54.713863088Z" level=info msg="StartContainer for \"f1f44e664d71160991c2b5ba0c64d2c48c14a9fdfefca8f8db711a858b640ef5\"" Dec 13 14:31:54.731963 systemd[1]: Started cri-containerd-f1f44e664d71160991c2b5ba0c64d2c48c14a9fdfefca8f8db711a858b640ef5.scope. Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f38f8de4c28 items=0 ppid=3098 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663434653636346437313136303939316332623562613063363464 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit: BPF prog-id=131 op=LOAD Dec 13 14:31:54.741000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00043e418 items=0 ppid=3098 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663434653636346437313136303939316332623562613063363464 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit: BPF prog-id=132 op=LOAD Dec 13 14:31:54.741000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00043e468 items=0 ppid=3098 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663434653636346437313136303939316332623562613063363464 Dec 13 14:31:54.741000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:31:54.741000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { perfmon } for pid=3377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit[3377]: AVC avc: denied { bpf } for pid=3377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.741000 audit: BPF prog-id=133 op=LOAD Dec 13 14:31:54.741000 audit[3377]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00043e4f8 items=0 ppid=3098 pid=3377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663434653636346437313136303939316332623562613063363464 Dec 13 14:31:54.752582 kubelet[1471]: I1213 14:31:54.751860 1471 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-qs4q7" podStartSLOduration=39.35624615 podStartE2EDuration="44.751830895s" podCreationTimestamp="2024-12-13 14:31:10 +0000 UTC" firstStartedPulling="2024-12-13 14:31:44.341334003 +0000 UTC m=+51.070233436" lastFinishedPulling="2024-12-13 14:31:49.736918738 +0000 UTC m=+56.465818181" observedRunningTime="2024-12-13 14:31:50.395968197 +0000 UTC m=+57.124867630" watchObservedRunningTime="2024-12-13 14:31:54.751830895 +0000 UTC m=+61.480730338" Dec 13 14:31:54.757683 systemd[1]: Created slice kubepods-besteffort-pod63ad4fee_74d9_4b93_b792_05b9c49c1d30.slice. Dec 13 14:31:54.759962 env[1206]: time="2024-12-13T14:31:54.759923339Z" level=info msg="StartContainer for \"f1f44e664d71160991c2b5ba0c64d2c48c14a9fdfefca8f8db711a858b640ef5\" returns successfully" Dec 13 14:31:54.911294 kubelet[1471]: I1213 14:31:54.911249 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jnhpk\" (UniqueName: \"kubernetes.io/projected/63ad4fee-74d9-4b93-b792-05b9c49c1d30-kube-api-access-jnhpk\") pod \"nfs-server-provisioner-0\" (UID: \"63ad4fee-74d9-4b93-b792-05b9c49c1d30\") " pod="default/nfs-server-provisioner-0" Dec 13 14:31:54.911294 kubelet[1471]: I1213 14:31:54.911289 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/63ad4fee-74d9-4b93-b792-05b9c49c1d30-data\") pod \"nfs-server-provisioner-0\" (UID: \"63ad4fee-74d9-4b93-b792-05b9c49c1d30\") " pod="default/nfs-server-provisioner-0" Dec 13 14:31:55.061099 env[1206]: time="2024-12-13T14:31:55.060998644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:63ad4fee-74d9-4b93-b792-05b9c49c1d30,Namespace:default,Attempt:0,}" Dec 13 14:31:55.207734 kubelet[1471]: I1213 14:31:55.207706 1471 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:31:55.207734 kubelet[1471]: I1213 14:31:55.207734 1471 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:31:55.462916 systemd-networkd[1038]: cali60e51b789ff: Link UP Dec 13 14:31:55.464889 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:55.464936 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:31:55.465191 systemd-networkd[1038]: cali60e51b789ff: Gained carrier Dec 13 14:31:55.472949 kubelet[1471]: I1213 14:31:55.472891 1471 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-zk2cr" podStartSLOduration=54.269913895 podStartE2EDuration="1m1.472872902s" podCreationTimestamp="2024-12-13 14:30:54 +0000 UTC" firstStartedPulling="2024-12-13 14:31:47.49142061 +0000 UTC m=+54.220320053" lastFinishedPulling="2024-12-13 14:31:54.694379616 +0000 UTC m=+61.423279060" observedRunningTime="2024-12-13 14:31:55.39707686 +0000 UTC m=+62.125976293" watchObservedRunningTime="2024-12-13 14:31:55.472872902 +0000 UTC m=+62.201772345" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.407 [INFO][3411] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.141-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 63ad4fee-74d9-4b93-b792-05b9c49c1d30 1235 0 2024-12-13 14:31:54 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.141 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.408 [INFO][3411] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.430 [INFO][3424] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" HandleID="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Workload="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.437 [INFO][3424] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" HandleID="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Workload="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000144040), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.141", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:31:55.430843454 +0000 UTC"}, Hostname:"10.0.0.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.438 [INFO][3424] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.438 [INFO][3424] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.438 [INFO][3424] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.141' Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.439 [INFO][3424] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.442 [INFO][3424] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.446 [INFO][3424] ipam/ipam.go 489: Trying affinity for 192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.447 [INFO][3424] ipam/ipam.go 155: Attempting to load block cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.449 [INFO][3424] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.449 [INFO][3424] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.117.128/26 handle="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.450 [INFO][3424] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563 Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.454 [INFO][3424] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.117.128/26 handle="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.459 [INFO][3424] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.117.131/26] block=192.168.117.128/26 handle="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.459 [INFO][3424] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.117.131/26] handle="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" host="10.0.0.141" Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.459 [INFO][3424] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:55.474249 env[1206]: 2024-12-13 14:31:55.459 [INFO][3424] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.131/26] IPv6=[] ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" HandleID="k8s-pod-network.dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Workload="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:31:55.474961 env[1206]: 2024-12-13 14:31:55.461 [INFO][3411] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"63ad4fee-74d9-4b93-b792-05b9c49c1d30", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.117.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:55.474961 env[1206]: 2024-12-13 14:31:55.461 [INFO][3411] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.117.131/32] ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:31:55.474961 env[1206]: 2024-12-13 14:31:55.461 [INFO][3411] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:31:55.474961 env[1206]: 2024-12-13 14:31:55.465 [INFO][3411] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:31:55.475141 env[1206]: 2024-12-13 14:31:55.465 [INFO][3411] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"63ad4fee-74d9-4b93-b792-05b9c49c1d30", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.117.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"86:fe:38:83:37:f7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:55.475141 env[1206]: 2024-12-13 14:31:55.473 [INFO][3411] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.141-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:31:55.486000 audit[3451]: NETFILTER_CFG table=filter:87 family=2 entries=44 op=nft_register_chain pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:55.486000 audit[3451]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffeae7df510 a2=0 a3=7ffeae7df4fc items=0 ppid=2697 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.486000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:55.490295 env[1206]: time="2024-12-13T14:31:55.490233556Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:55.490295 env[1206]: time="2024-12-13T14:31:55.490275574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:55.490295 env[1206]: time="2024-12-13T14:31:55.490286204Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:55.490578 env[1206]: time="2024-12-13T14:31:55.490519523Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563 pid=3455 runtime=io.containerd.runc.v2 Dec 13 14:31:55.499630 systemd[1]: Started cri-containerd-dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563.scope. Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.509000 audit: BPF prog-id=134 op=LOAD Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3455 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663532656136376631623939343633326361323939376532656636 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3455 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663532656136376631623939343633326361323939376532656636 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit: BPF prog-id=135 op=LOAD Dec 13 14:31:55.510000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025fce0 items=0 ppid=3455 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663532656136376631623939343633326361323939376532656636 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit: BPF prog-id=136 op=LOAD Dec 13 14:31:55.510000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025fd28 items=0 ppid=3455 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663532656136376631623939343633326361323939376532656636 Dec 13 14:31:55.510000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:31:55.510000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.510000 audit: BPF prog-id=137 op=LOAD Dec 13 14:31:55.510000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4138 items=0 ppid=3455 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663532656136376631623939343633326361323939376532656636 Dec 13 14:31:55.512396 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:55.532396 env[1206]: time="2024-12-13T14:31:55.532355577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:63ad4fee-74d9-4b93-b792-05b9c49c1d30,Namespace:default,Attempt:0,} returns sandbox id \"dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563\"" Dec 13 14:31:55.534069 env[1206]: time="2024-12-13T14:31:55.534026956Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:31:55.570199 kubelet[1471]: E1213 14:31:55.570157 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:56.570571 kubelet[1471]: E1213 14:31:56.570490 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:56.859719 systemd-networkd[1038]: cali60e51b789ff: Gained IPv6LL Dec 13 14:31:57.570971 kubelet[1471]: E1213 14:31:57.570924 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:58.040257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3568140760.mount: Deactivated successfully. Dec 13 14:31:58.571995 kubelet[1471]: E1213 14:31:58.571943 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:59.572591 kubelet[1471]: E1213 14:31:59.572549 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:00.572825 kubelet[1471]: E1213 14:32:00.572771 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:01.109403 env[1206]: time="2024-12-13T14:32:01.109348235Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:01.111373 env[1206]: time="2024-12-13T14:32:01.111327489Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:01.116927 env[1206]: time="2024-12-13T14:32:01.116891090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:01.118773 env[1206]: time="2024-12-13T14:32:01.118747124Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:01.119423 env[1206]: time="2024-12-13T14:32:01.119386194Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:32:01.119943 kubelet[1471]: E1213 14:32:01.119909 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:32:01.121477 env[1206]: time="2024-12-13T14:32:01.121449215Z" level=info msg="CreateContainer within sandbox \"dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:32:01.134625 env[1206]: time="2024-12-13T14:32:01.134576732Z" level=info msg="CreateContainer within sandbox \"dbf52ea67f1b994632ca2997e2ef6e9fe9d0c940ef3a7c837e565d4027f39563\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"2f33566727a5b010c5fcafb979f08b2a7621271824b0729561a1e9ba5087fab9\"" Dec 13 14:32:01.135060 env[1206]: time="2024-12-13T14:32:01.135039441Z" level=info msg="StartContainer for \"2f33566727a5b010c5fcafb979f08b2a7621271824b0729561a1e9ba5087fab9\"" Dec 13 14:32:01.151468 systemd[1]: Started cri-containerd-2f33566727a5b010c5fcafb979f08b2a7621271824b0729561a1e9ba5087fab9.scope. Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.161135 kernel: kauditd_printk_skb: 160 callbacks suppressed Dec 13 14:32:01.161198 kernel: audit: type=1400 audit(1734100321.158:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.168232 kernel: audit: type=1400 audit(1734100321.158:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.168274 kernel: audit: type=1400 audit(1734100321.158:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.171750 kernel: audit: type=1400 audit(1734100321.158:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.175295 kernel: audit: type=1400 audit(1734100321.158:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.182419 kernel: audit: type=1400 audit(1734100321.158:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.182462 kernel: audit: type=1400 audit(1734100321.158:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.189386 kernel: audit: type=1400 audit(1734100321.158:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.189425 kernel: audit: type=1400 audit(1734100321.158:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.196744 kernel: audit: type=1400 audit(1734100321.163:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit: BPF prog-id=138 op=LOAD Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3455 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333335363637323761356230313063356663616662393739663038 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3455 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333335363637323761356230313063356663616662393739663038 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.163000 audit: BPF prog-id=139 op=LOAD Dec 13 14:32:01.163000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000386780 items=0 ppid=3455 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333335363637323761356230313063356663616662393739663038 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.166000 audit: BPF prog-id=140 op=LOAD Dec 13 14:32:01.166000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003867c8 items=0 ppid=3455 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333335363637323761356230313063356663616662393739663038 Dec 13 14:32:01.170000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:32:01.170000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.170000 audit: BPF prog-id=141 op=LOAD Dec 13 14:32:01.170000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000386bd8 items=0 ppid=3455 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333335363637323761356230313063356663616662393739663038 Dec 13 14:32:01.200256 env[1206]: time="2024-12-13T14:32:01.200219699Z" level=info msg="StartContainer for \"2f33566727a5b010c5fcafb979f08b2a7621271824b0729561a1e9ba5087fab9\" returns successfully" Dec 13 14:32:01.236000 audit[3527]: AVC avc: denied { search } for pid=3527 comm="rpcbind" name="crypto" dev="proc" ino=24695 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:32:01.236000 audit[3527]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f00efe970c0 a2=0 a3=0 items=0 ppid=3509 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 key=(null) Dec 13 14:32:01.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:32:01.270000 audit[3532]: AVC avc: denied { search } for pid=3532 comm="dbus-daemon" name="crypto" dev="proc" ino=24695 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:32:01.270000 audit[3532]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa7c6c680c0 a2=0 a3=0 items=0 ppid=3509 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 key=(null) Dec 13 14:32:01.270000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:32:01.274000 audit[3533]: AVC avc: denied { watch } for pid=3533 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538750 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c409,c445 tclass=dir permissive=0 Dec 13 14:32:01.274000 audit[3533]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=564cefdb4040 a2=2c8 a3=7ffd93d9d0ac items=0 ppid=3509 pid=3533 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 key=(null) Dec 13 14:32:01.274000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:32:01.276000 audit[3534]: AVC avc: denied { read } for pid=3534 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21501 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:32:01.276000 audit[3534]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fce5d0bd320 a1=80000 a2=d a3=7fff6296be70 items=0 ppid=3509 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 key=(null) Dec 13 14:32:01.276000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:32:01.277000 audit[3534]: AVC avc: denied { search } for pid=3534 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24695 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:32:01.277000 audit[3534]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fce5c6110c0 a2=0 a3=0 items=0 ppid=3509 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c445 key=(null) Dec 13 14:32:01.277000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:32:01.285335 kubelet[1471]: I1213 14:32:01.285277 1471 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.69826403 podStartE2EDuration="7.285258778s" podCreationTimestamp="2024-12-13 14:31:54 +0000 UTC" firstStartedPulling="2024-12-13 14:31:55.533419565 +0000 UTC m=+62.262319008" lastFinishedPulling="2024-12-13 14:32:01.120414323 +0000 UTC m=+67.849313756" observedRunningTime="2024-12-13 14:32:01.285105921 +0000 UTC m=+68.014005364" watchObservedRunningTime="2024-12-13 14:32:01.285258778 +0000 UTC m=+68.014158221" Dec 13 14:32:01.296000 audit[3554]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=3554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:01.296000 audit[3554]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcf90809e0 a2=0 a3=7ffcf90809cc items=0 ppid=1627 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:01.306000 audit[3554]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=3554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:01.306000 audit[3554]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcf90809e0 a2=0 a3=7ffcf90809cc items=0 ppid=1627 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:01.573204 kubelet[1471]: E1213 14:32:01.573170 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:02.574301 kubelet[1471]: E1213 14:32:02.574241 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:03.574589 kubelet[1471]: E1213 14:32:03.574539 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:04.574765 kubelet[1471]: E1213 14:32:04.574717 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:05.575176 kubelet[1471]: E1213 14:32:05.575115 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:06.575564 kubelet[1471]: E1213 14:32:06.575526 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:07.575829 kubelet[1471]: E1213 14:32:07.575769 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:08.575940 kubelet[1471]: E1213 14:32:08.575834 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:09.576976 kubelet[1471]: E1213 14:32:09.576948 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:09.878872 kubelet[1471]: E1213 14:32:09.878753 1471 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:32:10.577785 kubelet[1471]: E1213 14:32:10.577708 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:11.578444 kubelet[1471]: E1213 14:32:11.578370 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:12.578550 kubelet[1471]: E1213 14:32:12.578487 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:13.530670 kubelet[1471]: E1213 14:32:13.530593 1471 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:13.579295 kubelet[1471]: E1213 14:32:13.579241 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:14.580405 kubelet[1471]: E1213 14:32:14.580330 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:14.958876 systemd[1]: Created slice kubepods-besteffort-pode5c8a96e_0c99_47d6_b9f6_dac83f97c552.slice. Dec 13 14:32:15.104722 kubelet[1471]: I1213 14:32:15.104653 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-12f7a1f4-9185-4a5b-823d-27824aa379fd\" (UniqueName: \"kubernetes.io/nfs/e5c8a96e-0c99-47d6-b9f6-dac83f97c552-pvc-12f7a1f4-9185-4a5b-823d-27824aa379fd\") pod \"test-pod-1\" (UID: \"e5c8a96e-0c99-47d6-b9f6-dac83f97c552\") " pod="default/test-pod-1" Dec 13 14:32:15.105104 kubelet[1471]: I1213 14:32:15.105077 1471 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9vfw\" (UniqueName: \"kubernetes.io/projected/e5c8a96e-0c99-47d6-b9f6-dac83f97c552-kube-api-access-v9vfw\") pod \"test-pod-1\" (UID: \"e5c8a96e-0c99-47d6-b9f6-dac83f97c552\") " pod="default/test-pod-1" Dec 13 14:32:15.215000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.219612 kernel: Failed to create system directory netfs Dec 13 14:32:15.219735 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:32:15.219753 kernel: audit: type=1400 audit(1734100335.215:816): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.219774 kernel: Failed to create system directory netfs Dec 13 14:32:15.215000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.223925 kernel: audit: type=1400 audit(1734100335.215:816): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.223964 kernel: Failed to create system directory netfs Dec 13 14:32:15.224713 kernel: audit: type=1400 audit(1734100335.215:816): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.215000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.228203 kernel: Failed to create system directory netfs Dec 13 14:32:15.215000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.236880 kernel: audit: type=1400 audit(1734100335.215:816): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.215000 audit[3594]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d85e7405e0 a1=153bc a2=55d824b9d2b0 a3=5 items=0 ppid=507 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.215000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:15.243973 kernel: audit: type=1300 audit(1734100335.215:816): arch=c000003e syscall=175 success=yes exit=0 a0=55d85e7405e0 a1=153bc a2=55d824b9d2b0 a3=5 items=0 ppid=507 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.244026 kernel: audit: type=1327 audit(1734100335.215:816): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:15.244050 kernel: Failed to create system directory fscache Dec 13 14:32:15.244068 kernel: audit: type=1400 audit(1734100335.240:817): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.248833 kernel: Failed to create system directory fscache Dec 13 14:32:15.248876 kernel: audit: type=1400 audit(1734100335.240:817): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.248895 kernel: Failed to create system directory fscache Dec 13 14:32:15.252045 kernel: audit: type=1400 audit(1734100335.240:817): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.256065 kernel: Failed to create system directory fscache Dec 13 14:32:15.256098 kernel: audit: type=1400 audit(1734100335.240:817): avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.260041 kernel: Failed to create system directory fscache Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.261672 kernel: Failed to create system directory fscache Dec 13 14:32:15.261722 kernel: Failed to create system directory fscache Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.263151 kernel: Failed to create system directory fscache Dec 13 14:32:15.263182 kernel: Failed to create system directory fscache Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.264689 kernel: Failed to create system directory fscache Dec 13 14:32:15.264722 kernel: Failed to create system directory fscache Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.266166 kernel: Failed to create system directory fscache Dec 13 14:32:15.266209 kernel: Failed to create system directory fscache Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.240000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.267673 kernel: Failed to create system directory fscache Dec 13 14:32:15.240000 audit[3594]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d85e9559c0 a1=4c0fc a2=55d824b9d2b0 a3=5 items=0 ppid=507 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.269585 kernel: FS-Cache: Loaded Dec 13 14:32:15.240000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.299237 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.299285 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.299302 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.300880 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.300940 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.303154 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.303176 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.303190 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.304705 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.304739 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.306159 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.306177 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.307672 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.307716 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.309152 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.309177 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.310726 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.310749 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.312208 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.312229 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.313686 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.313726 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.315150 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.315176 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.316652 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.316677 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.318109 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.318144 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.319663 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.319703 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.321177 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.321208 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.322720 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.322758 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.325039 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.325070 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.325095 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.326587 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.326618 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.328101 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.328132 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.329662 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.329698 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.331176 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.331206 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.332712 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.332750 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.334219 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.334260 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.335768 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.335807 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.338062 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.338093 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.338121 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.339608 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.339646 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.341122 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.341160 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.342661 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.342699 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.344182 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.344228 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.345727 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.345757 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.347237 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.347276 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.348785 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.348824 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.351049 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.351088 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.351109 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.352595 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.352626 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.354126 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.354162 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.355667 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.355698 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.357171 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.357200 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.358717 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.358749 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.360221 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.360250 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.361750 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.361789 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.364022 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.364160 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.364182 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.365593 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.365632 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.367095 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.367132 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.368633 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.368670 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.370205 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.370250 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.370939 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.373191 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.373239 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.373256 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.374761 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.374800 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.376210 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.376233 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.377724 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.377766 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.379986 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.380031 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.380052 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.382238 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.382275 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.382295 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.382982 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.384547 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.384589 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.385996 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.386023 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.388188 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.388223 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.388248 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.389672 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.389699 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.391135 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.391162 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.392618 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.392645 kernel: Failed to create system directory sunrpc Dec 13 14:32:15.287000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.402707 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:32:15.402755 kernel: RPC: Registered udp transport module. Dec 13 14:32:15.402783 kernel: RPC: Registered tcp transport module. Dec 13 14:32:15.404325 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:32:15.287000 audit[3594]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d85e9a1ad0 a1=1a7f1c a2=55d824b9d2b0 a3=5 items=6 ppid=507 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.287000 audit: CWD cwd="/" Dec 13 14:32:15.287000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:15.287000 audit: PATH item=1 name=(null) inode=26730 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:15.287000 audit: PATH item=2 name=(null) inode=26730 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:15.287000 audit: PATH item=3 name=(null) inode=26731 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:15.287000 audit: PATH item=4 name=(null) inode=26730 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:15.287000 audit: PATH item=5 name=(null) inode=26732 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:15.287000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.437820 kernel: Failed to create system directory nfs Dec 13 14:32:15.437864 kernel: Failed to create system directory nfs Dec 13 14:32:15.437884 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.439906 kernel: Failed to create system directory nfs Dec 13 14:32:15.439943 kernel: Failed to create system directory nfs Dec 13 14:32:15.439968 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.441981 kernel: Failed to create system directory nfs Dec 13 14:32:15.442018 kernel: Failed to create system directory nfs Dec 13 14:32:15.442039 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.444138 kernel: Failed to create system directory nfs Dec 13 14:32:15.444184 kernel: Failed to create system directory nfs Dec 13 14:32:15.444206 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.445537 kernel: Failed to create system directory nfs Dec 13 14:32:15.445568 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.446907 kernel: Failed to create system directory nfs Dec 13 14:32:15.446942 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.448987 kernel: Failed to create system directory nfs Dec 13 14:32:15.449037 kernel: Failed to create system directory nfs Dec 13 14:32:15.449054 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.451066 kernel: Failed to create system directory nfs Dec 13 14:32:15.451103 kernel: Failed to create system directory nfs Dec 13 14:32:15.451126 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.453141 kernel: Failed to create system directory nfs Dec 13 14:32:15.453178 kernel: Failed to create system directory nfs Dec 13 14:32:15.453197 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.454546 kernel: Failed to create system directory nfs Dec 13 14:32:15.454584 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.455933 kernel: Failed to create system directory nfs Dec 13 14:32:15.455963 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.458097 kernel: Failed to create system directory nfs Dec 13 14:32:15.458133 kernel: Failed to create system directory nfs Dec 13 14:32:15.458151 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.459533 kernel: Failed to create system directory nfs Dec 13 14:32:15.459564 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.460965 kernel: Failed to create system directory nfs Dec 13 14:32:15.461007 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.463062 kernel: Failed to create system directory nfs Dec 13 14:32:15.463092 kernel: Failed to create system directory nfs Dec 13 14:32:15.463114 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.465133 kernel: Failed to create system directory nfs Dec 13 14:32:15.465176 kernel: Failed to create system directory nfs Dec 13 14:32:15.465193 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.466577 kernel: Failed to create system directory nfs Dec 13 14:32:15.466601 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.468029 kernel: Failed to create system directory nfs Dec 13 14:32:15.468065 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.469681 kernel: Failed to create system directory nfs Dec 13 14:32:15.469728 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.471975 kernel: Failed to create system directory nfs Dec 13 14:32:15.472005 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.475438 kernel: Failed to create system directory nfs Dec 13 14:32:15.475470 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.476964 kernel: Failed to create system directory nfs Dec 13 14:32:15.476991 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.479183 kernel: Failed to create system directory nfs Dec 13 14:32:15.479224 kernel: Failed to create system directory nfs Dec 13 14:32:15.479240 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.480706 kernel: Failed to create system directory nfs Dec 13 14:32:15.480734 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.429000 audit[3594]: AVC avc: denied { confidentiality } for pid=3594 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.482066 kernel: Failed to create system directory nfs Dec 13 14:32:15.429000 audit[3594]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d85ebc2700 a1=16e97c a2=55d824b9d2b0 a3=5 items=0 ppid=507 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.429000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:15.503519 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.538812 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.538858 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.538878 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.540892 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.540916 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.540942 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.542984 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.543010 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.543030 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.545089 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.545126 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.545152 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.547163 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.547189 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.547209 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.548551 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.548580 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.549951 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.549984 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.552021 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.552048 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.552065 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.554095 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.554124 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.554151 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.554797 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.556164 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.556189 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.557555 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.557589 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.558931 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.558968 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.559633 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.561032 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.561075 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.563133 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.563164 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.563178 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.564533 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.564572 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.565967 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.566004 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.568147 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.568177 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.568195 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.569674 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.569715 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.571089 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.571119 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.573173 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.573218 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.573239 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.573863 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.575958 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.575996 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.576014 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.576650 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.578019 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.578056 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.578702 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.580086 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.580214 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.581210 kubelet[1471]: E1213 14:32:15.581179 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:15.581556 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.581604 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.583010 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.583038 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.585138 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.585164 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.585191 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.586561 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.586586 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.587953 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.587981 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.590085 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.590118 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.590145 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.591516 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.591546 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.593036 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.593076 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.594693 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.594734 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.596207 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.596242 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.597610 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.597640 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.598988 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.599020 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.601083 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.601108 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.601128 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.603171 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.603207 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.603225 kernel: Failed to create system directory nfs4 Dec 13 14:32:15.526000 audit[3601]: AVC avc: denied { confidentiality } for pid=3601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.739745 kernel: NFS: Registering the id_resolver key type Dec 13 14:32:15.739882 kernel: Key type id_resolver registered Dec 13 14:32:15.739905 kernel: Key type id_legacy registered Dec 13 14:32:15.526000 audit[3601]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd951060010 a1=208de4 a2=561735b2d2b0 a3=5 items=0 ppid=507 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.526000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.756529 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.756562 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.757942 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.757978 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.760098 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.760124 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.760144 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.761586 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.761613 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.763053 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.763090 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.764538 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.764581 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.765966 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.765998 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.768114 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.768138 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.768162 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.769561 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.769586 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.771093 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.771120 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.772547 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.772613 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.774012 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.774039 kernel: Failed to create system directory rpcgss Dec 13 14:32:15.752000 audit[3602]: AVC avc: denied { confidentiality } for pid=3602 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:15.752000 audit[3602]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2ba65e5010 a1=70af4 a2=5562eacf02b0 a3=5 items=0 ppid=507 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.752000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:32:15.818350 nfsidmap[3609]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:32:15.821028 nfsidmap[3612]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:32:15.827000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:15.827000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:15.827000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d9906f3410 a2=10 a3=3efe88e68b344e7c items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.827000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:15.827000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:32:15.827000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:15.827000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:15.827000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d9906f3410 a2=10 a3=3efe88e68b344e7c items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.827000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:32:15.827000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:15.827000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d9906f3410 a2=10 a3=3efe88e68b344e7c items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:15.827000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:32:15.862236 env[1206]: time="2024-12-13T14:32:15.862194542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e5c8a96e-0c99-47d6-b9f6-dac83f97c552,Namespace:default,Attempt:0,}" Dec 13 14:32:16.020780 systemd-networkd[1038]: cali5ec59c6bf6e: Link UP Dec 13 14:32:16.023365 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:32:16.023428 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:32:16.023566 systemd-networkd[1038]: cali5ec59c6bf6e: Gained carrier Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.958 [INFO][3616] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.141-k8s-test--pod--1-eth0 default e5c8a96e-0c99-47d6-b9f6-dac83f97c552 1348 0 2024-12-13 14:31:55 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.141 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.959 [INFO][3616] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-eth0" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.985 [INFO][3629] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" HandleID="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Workload="10.0.0.141-k8s-test--pod--1-eth0" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.992 [INFO][3629] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" HandleID="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Workload="10.0.0.141-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002fe020), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.141", "pod":"test-pod-1", "timestamp":"2024-12-13 14:32:15.985243814 +0000 UTC"}, Hostname:"10.0.0.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.992 [INFO][3629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.992 [INFO][3629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.992 [INFO][3629] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.141' Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.994 [INFO][3629] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:15.997 [INFO][3629] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.001 [INFO][3629] ipam/ipam.go 489: Trying affinity for 192.168.117.128/26 host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.002 [INFO][3629] ipam/ipam.go 155: Attempting to load block cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.006 [INFO][3629] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.117.128/26 host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.006 [INFO][3629] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.117.128/26 handle="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.007 [INFO][3629] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.011 [INFO][3629] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.117.128/26 handle="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.017 [INFO][3629] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.117.132/26] block=192.168.117.128/26 handle="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.017 [INFO][3629] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.117.132/26] handle="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" host="10.0.0.141" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.017 [INFO][3629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.017 [INFO][3629] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.132/26] IPv6=[] ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" HandleID="k8s-pod-network.e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Workload="10.0.0.141-k8s-test--pod--1-eth0" Dec 13 14:32:16.031570 env[1206]: 2024-12-13 14:32:16.018 [INFO][3616] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e5c8a96e-0c99-47d6-b9f6-dac83f97c552", ResourceVersion:"1348", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:16.032393 env[1206]: 2024-12-13 14:32:16.019 [INFO][3616] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.117.132/32] ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-eth0" Dec 13 14:32:16.032393 env[1206]: 2024-12-13 14:32:16.019 [INFO][3616] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-eth0" Dec 13 14:32:16.032393 env[1206]: 2024-12-13 14:32:16.023 [INFO][3616] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-eth0" Dec 13 14:32:16.032393 env[1206]: 2024-12-13 14:32:16.023 [INFO][3616] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.141-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e5c8a96e-0c99-47d6-b9f6-dac83f97c552", ResourceVersion:"1348", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.141", ContainerID:"e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"62:77:ba:53:55:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:16.032393 env[1206]: 2024-12-13 14:32:16.029 [INFO][3616] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.141-k8s-test--pod--1-eth0" Dec 13 14:32:16.038000 audit[3651]: NETFILTER_CFG table=filter:90 family=2 entries=34 op=nft_register_chain pid=3651 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:16.038000 audit[3651]: SYSCALL arch=c000003e syscall=46 success=yes exit=18232 a0=3 a1=7fffdfe3e2c0 a2=0 a3=7fffdfe3e2ac items=0 ppid=2697 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.038000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:16.057596 env[1206]: time="2024-12-13T14:32:16.057510560Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:16.057596 env[1206]: time="2024-12-13T14:32:16.057545947Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:16.057596 env[1206]: time="2024-12-13T14:32:16.057556597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:16.057768 env[1206]: time="2024-12-13T14:32:16.057726777Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe pid=3659 runtime=io.containerd.runc.v2 Dec 13 14:32:16.066529 systemd[1]: Started cri-containerd-e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe.scope. Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit: BPF prog-id=142 op=LOAD Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376562383863383762666265383037666136393535313562393861 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376562383863383762666265383037666136393535313562393861 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit: BPF prog-id=143 op=LOAD Dec 13 14:32:16.075000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038c740 items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376562383863383762666265383037666136393535313562393861 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit: BPF prog-id=144 op=LOAD Dec 13 14:32:16.075000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038c788 items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376562383863383762666265383037666136393535313562393861 Dec 13 14:32:16.075000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:32:16.075000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.075000 audit: BPF prog-id=145 op=LOAD Dec 13 14:32:16.075000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038cb98 items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376562383863383762666265383037666136393535313562393861 Dec 13 14:32:16.078042 systemd-resolved[1148]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:32:16.097017 env[1206]: time="2024-12-13T14:32:16.096979004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e5c8a96e-0c99-47d6-b9f6-dac83f97c552,Namespace:default,Attempt:0,} returns sandbox id \"e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe\"" Dec 13 14:32:16.098631 env[1206]: time="2024-12-13T14:32:16.098599744Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:32:16.582046 kubelet[1471]: E1213 14:32:16.581982 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:16.672366 env[1206]: time="2024-12-13T14:32:16.672312114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.687388 env[1206]: time="2024-12-13T14:32:16.687344819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.701091 env[1206]: time="2024-12-13T14:32:16.701054805Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.703344 env[1206]: time="2024-12-13T14:32:16.703301273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.703894 env[1206]: time="2024-12-13T14:32:16.703862719Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:32:16.706053 env[1206]: time="2024-12-13T14:32:16.706024086Z" level=info msg="CreateContainer within sandbox \"e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:32:16.759917 env[1206]: time="2024-12-13T14:32:16.759858211Z" level=info msg="CreateContainer within sandbox \"e87eb88c87bfbe807fa695515b98ab82ecd30ca70c92b24a3eee3b6c602e0bfe\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d4ec4d65e0270d9b5939b2e4a67af2dbac3c0a5514b1ef09d4cfa9733aa0b0a4\"" Dec 13 14:32:16.760470 env[1206]: time="2024-12-13T14:32:16.760421059Z" level=info msg="StartContainer for \"d4ec4d65e0270d9b5939b2e4a67af2dbac3c0a5514b1ef09d4cfa9733aa0b0a4\"" Dec 13 14:32:16.776147 systemd[1]: Started cri-containerd-d4ec4d65e0270d9b5939b2e4a67af2dbac3c0a5514b1ef09d4cfa9733aa0b0a4.scope. Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit: BPF prog-id=146 op=LOAD Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3659 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656334643635653032373064396235393339623265346136376166 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3659 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656334643635653032373064396235393339623265346136376166 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.784000 audit: BPF prog-id=147 op=LOAD Dec 13 14:32:16.784000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002f28c0 items=0 ppid=3659 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656334643635653032373064396235393339623265346136376166 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit: BPF prog-id=148 op=LOAD Dec 13 14:32:16.785000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002f2908 items=0 ppid=3659 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656334643635653032373064396235393339623265346136376166 Dec 13 14:32:16.785000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:32:16.785000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.785000 audit: BPF prog-id=149 op=LOAD Dec 13 14:32:16.785000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002f2d18 items=0 ppid=3659 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656334643635653032373064396235393339623265346136376166 Dec 13 14:32:16.798255 env[1206]: time="2024-12-13T14:32:16.798203572Z" level=info msg="StartContainer for \"d4ec4d65e0270d9b5939b2e4a67af2dbac3c0a5514b1ef09d4cfa9733aa0b0a4\" returns successfully" Dec 13 14:32:17.312624 kubelet[1471]: I1213 14:32:17.312557 1471 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=21.705795569 podStartE2EDuration="22.312541544s" podCreationTimestamp="2024-12-13 14:31:55 +0000 UTC" firstStartedPulling="2024-12-13 14:32:16.098174745 +0000 UTC m=+82.827074188" lastFinishedPulling="2024-12-13 14:32:16.70492072 +0000 UTC m=+83.433820163" observedRunningTime="2024-12-13 14:32:17.312171582 +0000 UTC m=+84.041071035" watchObservedRunningTime="2024-12-13 14:32:17.312541544 +0000 UTC m=+84.041440978" Dec 13 14:32:17.530747 systemd-networkd[1038]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:32:17.582155 kubelet[1471]: E1213 14:32:17.582085 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:18.582590 kubelet[1471]: E1213 14:32:18.582521 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:19.583398 kubelet[1471]: E1213 14:32:19.583346 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:20.584041 kubelet[1471]: E1213 14:32:20.583979 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:21.584417 kubelet[1471]: E1213 14:32:21.584355 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:22.585026 kubelet[1471]: E1213 14:32:22.584964 1471 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"