Dec 13 02:36:04.650521 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:36:04.650535 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:36:04.650541 kernel: Disabled fast string operations Dec 13 02:36:04.650545 kernel: BIOS-provided physical RAM map: Dec 13 02:36:04.650548 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 02:36:04.650552 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 02:36:04.650558 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 02:36:04.650562 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 02:36:04.650566 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 02:36:04.650570 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 02:36:04.650574 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 02:36:04.650578 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 02:36:04.650582 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 02:36:04.650586 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 02:36:04.650592 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 02:36:04.650596 kernel: NX (Execute Disable) protection: active Dec 13 02:36:04.650601 kernel: SMBIOS 2.7 present. Dec 13 02:36:04.650605 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 02:36:04.650609 kernel: vmware: hypercall mode: 0x00 Dec 13 02:36:04.650614 kernel: Hypervisor detected: VMware Dec 13 02:36:04.650619 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 02:36:04.650623 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 02:36:04.650627 kernel: vmware: using clock offset of 2632366295 ns Dec 13 02:36:04.650632 kernel: tsc: Detected 3408.000 MHz processor Dec 13 02:36:04.650637 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:36:04.650642 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:36:04.650646 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 02:36:04.650651 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:36:04.650655 kernel: total RAM covered: 3072M Dec 13 02:36:04.650661 kernel: Found optimal setting for mtrr clean up Dec 13 02:36:04.650666 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 02:36:04.650670 kernel: Using GB pages for direct mapping Dec 13 02:36:04.650675 kernel: ACPI: Early table checksum verification disabled Dec 13 02:36:04.650679 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 02:36:04.650684 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 02:36:04.650689 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 02:36:04.650694 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 02:36:04.650698 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:36:04.650703 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:36:04.650708 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 02:36:04.650715 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 02:36:04.650719 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 02:36:04.650724 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 02:36:04.650729 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 02:36:04.650735 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 02:36:04.650740 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 02:36:04.650745 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 02:36:04.650750 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:36:04.650755 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:36:04.650759 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 02:36:04.650764 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 02:36:04.650769 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 02:36:04.650774 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 02:36:04.650780 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 02:36:04.650784 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 02:36:04.650789 kernel: system APIC only can use physical flat Dec 13 02:36:04.650794 kernel: Setting APIC routing to physical flat. Dec 13 02:36:04.650799 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:36:04.650804 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 02:36:04.650809 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 02:36:04.650814 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 02:36:04.650818 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 02:36:04.650824 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 02:36:04.650829 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 02:36:04.650833 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 02:36:04.650838 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 02:36:04.650843 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 02:36:04.650847 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 02:36:04.650852 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 02:36:04.650857 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 02:36:04.650862 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 02:36:04.650866 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 02:36:04.652689 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 02:36:04.652698 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 02:36:04.652703 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 02:36:04.652708 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 02:36:04.652731 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 02:36:04.652736 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 02:36:04.652741 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 02:36:04.652746 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 02:36:04.652751 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 02:36:04.652756 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 02:36:04.652764 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 02:36:04.652769 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 02:36:04.652773 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 02:36:04.652779 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 02:36:04.652783 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 02:36:04.652788 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 02:36:04.652793 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 02:36:04.652798 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 02:36:04.652803 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 02:36:04.652808 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 02:36:04.652814 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 02:36:04.652819 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 02:36:04.652824 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 02:36:04.652829 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 02:36:04.652834 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 02:36:04.652839 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 02:36:04.652844 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 02:36:04.652865 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 02:36:04.652877 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 02:36:04.652882 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 02:36:04.652907 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 02:36:04.652912 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 02:36:04.652917 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 02:36:04.652922 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 02:36:04.652927 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 02:36:04.652932 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 02:36:04.652937 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 02:36:04.652941 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 02:36:04.652946 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 02:36:04.652952 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 02:36:04.652957 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 02:36:04.652962 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 02:36:04.652967 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 02:36:04.652972 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 02:36:04.652977 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 02:36:04.652982 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 02:36:04.652992 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 02:36:04.652997 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 02:36:04.653002 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 02:36:04.653007 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 02:36:04.653013 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 02:36:04.653019 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 02:36:04.653024 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 02:36:04.653030 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 02:36:04.653035 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 02:36:04.653040 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 02:36:04.653045 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 02:36:04.653051 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 02:36:04.653057 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 02:36:04.653063 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 02:36:04.653068 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 02:36:04.653073 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 02:36:04.653078 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 02:36:04.653084 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 02:36:04.653089 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 02:36:04.653094 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 02:36:04.653100 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 02:36:04.653106 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 02:36:04.653112 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 02:36:04.653117 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 02:36:04.653122 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 02:36:04.653127 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 02:36:04.653133 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 02:36:04.653138 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 02:36:04.653143 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 02:36:04.653148 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 02:36:04.653153 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 02:36:04.653160 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 02:36:04.653165 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 02:36:04.653170 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 02:36:04.653175 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 02:36:04.653181 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 02:36:04.653186 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 02:36:04.653191 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 02:36:04.653196 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 02:36:04.653201 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 02:36:04.653207 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 02:36:04.653213 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 02:36:04.653218 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 02:36:04.653223 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 02:36:04.653228 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 02:36:04.653234 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 02:36:04.653239 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 02:36:04.653245 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 02:36:04.653250 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 02:36:04.653255 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 02:36:04.653260 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 02:36:04.653267 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 02:36:04.653272 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 02:36:04.653277 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 02:36:04.653283 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 02:36:04.653288 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 02:36:04.653293 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 02:36:04.653298 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 02:36:04.653304 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 02:36:04.653309 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 02:36:04.653314 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 02:36:04.653320 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 02:36:04.653325 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 02:36:04.653347 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 02:36:04.653352 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 02:36:04.653357 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 02:36:04.653362 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 02:36:04.653367 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:36:04.653373 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 02:36:04.653378 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 02:36:04.653384 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 02:36:04.653390 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 02:36:04.653396 kernel: Zone ranges: Dec 13 02:36:04.653401 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:36:04.653406 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 02:36:04.653411 kernel: Normal empty Dec 13 02:36:04.653416 kernel: Movable zone start for each node Dec 13 02:36:04.653422 kernel: Early memory node ranges Dec 13 02:36:04.653427 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 02:36:04.653432 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 02:36:04.653438 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 02:36:04.653443 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 02:36:04.653449 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:36:04.653454 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 02:36:04.653459 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 02:36:04.653464 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 02:36:04.653470 kernel: system APIC only can use physical flat Dec 13 02:36:04.653475 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 02:36:04.653480 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 02:36:04.653486 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 02:36:04.653491 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 02:36:04.653497 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 02:36:04.653502 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 02:36:04.653507 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 02:36:04.653512 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 02:36:04.653518 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 02:36:04.653523 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 02:36:04.653528 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 02:36:04.653534 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 02:36:04.653539 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 02:36:04.653545 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 02:36:04.653550 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 02:36:04.653555 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 02:36:04.653560 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 02:36:04.653565 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 02:36:04.653570 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 02:36:04.653576 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 02:36:04.653581 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 02:36:04.653587 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 02:36:04.653592 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 02:36:04.653598 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 02:36:04.653603 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 02:36:04.653608 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 02:36:04.653613 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 02:36:04.653619 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 02:36:04.653624 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 02:36:04.653629 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 02:36:04.653635 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 02:36:04.653640 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 02:36:04.653645 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 02:36:04.653650 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 02:36:04.653656 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 02:36:04.653661 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 02:36:04.653666 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 02:36:04.653671 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 02:36:04.653676 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 02:36:04.653681 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 02:36:04.653688 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 02:36:04.653693 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 02:36:04.653698 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 02:36:04.653703 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 02:36:04.653708 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 02:36:04.653713 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 02:36:04.653718 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 02:36:04.653723 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 02:36:04.653729 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 02:36:04.653735 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 02:36:04.653740 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 02:36:04.653746 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 02:36:04.653751 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 02:36:04.653756 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 02:36:04.653761 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 02:36:04.653766 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 02:36:04.653771 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 02:36:04.653777 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 02:36:04.653783 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 02:36:04.653788 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 02:36:04.653793 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 02:36:04.653798 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 02:36:04.653803 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 02:36:04.653827 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 02:36:04.653832 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 02:36:04.653837 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 02:36:04.653842 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 02:36:04.653848 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 02:36:04.653854 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 02:36:04.653859 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 02:36:04.653865 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 02:36:04.653876 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 02:36:04.653897 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 02:36:04.653902 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 02:36:04.653907 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 02:36:04.653913 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 02:36:04.653918 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 02:36:04.653924 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 02:36:04.653929 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 02:36:04.653934 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 02:36:04.653940 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 02:36:04.653945 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 02:36:04.653950 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 02:36:04.653955 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 02:36:04.653961 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 02:36:04.653966 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 02:36:04.653971 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 02:36:04.653977 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 02:36:04.653982 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 02:36:04.653987 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 02:36:04.653993 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 02:36:04.653998 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 02:36:04.654003 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 02:36:04.654008 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 02:36:04.654014 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 02:36:04.654019 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 02:36:04.654025 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 02:36:04.654030 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 02:36:04.654035 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 02:36:04.654041 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 02:36:04.654046 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 02:36:04.654051 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 02:36:04.654056 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 02:36:04.654061 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 02:36:04.654066 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 02:36:04.654071 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 02:36:04.654077 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 02:36:04.654082 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 02:36:04.654087 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 02:36:04.654093 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 02:36:04.654098 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 02:36:04.654104 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 02:36:04.654109 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 02:36:04.654114 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 02:36:04.654119 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 02:36:04.654126 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 02:36:04.654131 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 02:36:04.654137 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 02:36:04.654142 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 02:36:04.654147 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 02:36:04.654152 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 02:36:04.654157 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 02:36:04.654162 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 02:36:04.654167 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 02:36:04.654173 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 02:36:04.654180 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 02:36:04.654185 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 02:36:04.654190 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 02:36:04.654195 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:36:04.654200 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 02:36:04.654206 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:36:04.654211 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 02:36:04.654216 kernel: TSC deadline timer available Dec 13 02:36:04.654222 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 02:36:04.654228 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 02:36:04.654233 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 02:36:04.654239 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:36:04.654244 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 02:36:04.654250 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 02:36:04.654255 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 02:36:04.654260 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 02:36:04.654266 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 02:36:04.654271 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 02:36:04.654277 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 02:36:04.654282 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 02:36:04.654287 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 02:36:04.654292 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 02:36:04.654304 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 02:36:04.654311 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 02:36:04.654317 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 02:36:04.654322 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 02:36:04.654328 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 02:36:04.654334 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 02:36:04.654340 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 02:36:04.654345 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 02:36:04.654350 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 02:36:04.654356 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 02:36:04.654362 kernel: Policy zone: DMA32 Dec 13 02:36:04.654368 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:36:04.654375 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:36:04.654381 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 02:36:04.654387 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 02:36:04.654392 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 02:36:04.654398 kernel: printk: log_buf_len: 1048576 bytes Dec 13 02:36:04.654403 kernel: printk: early log buf free: 239728(91%) Dec 13 02:36:04.654409 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:36:04.654415 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:36:04.654420 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:36:04.654428 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 155976K reserved, 0K cma-reserved) Dec 13 02:36:04.654433 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 02:36:04.654439 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:36:04.654444 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:36:04.654451 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:36:04.654457 kernel: rcu: RCU event tracing is enabled. Dec 13 02:36:04.654464 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 02:36:04.654469 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:36:04.654475 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:36:04.654480 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:36:04.654486 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 02:36:04.654492 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 02:36:04.654497 kernel: random: crng init done Dec 13 02:36:04.654503 kernel: Console: colour VGA+ 80x25 Dec 13 02:36:04.654509 kernel: printk: console [tty0] enabled Dec 13 02:36:04.654515 kernel: printk: console [ttyS0] enabled Dec 13 02:36:04.654521 kernel: ACPI: Core revision 20210730 Dec 13 02:36:04.654527 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 02:36:04.654532 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:36:04.654538 kernel: x2apic enabled Dec 13 02:36:04.654544 kernel: Switched APIC routing to physical x2apic. Dec 13 02:36:04.654550 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 02:36:04.654555 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:36:04.654561 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 02:36:04.654568 kernel: Disabled fast string operations Dec 13 02:36:04.654573 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 02:36:04.654579 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 02:36:04.654585 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:36:04.654590 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 02:36:04.654597 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:36:04.654603 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:36:04.654609 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 02:36:04.654614 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:36:04.654621 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 02:36:04.654627 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 02:36:04.654632 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:36:04.654638 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:36:04.654643 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:36:04.654649 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 02:36:04.654655 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 02:36:04.654660 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:36:04.654666 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:36:04.654673 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:36:04.654679 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:36:04.654684 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 02:36:04.654690 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:36:04.654696 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 02:36:04.654702 kernel: LSM: Security Framework initializing Dec 13 02:36:04.654707 kernel: SELinux: Initializing. Dec 13 02:36:04.654713 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:36:04.654718 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:36:04.654725 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 02:36:04.654731 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 02:36:04.654737 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 02:36:04.654742 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 02:36:04.654748 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 02:36:04.654753 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 02:36:04.654759 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 02:36:04.654764 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 02:36:04.654770 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 02:36:04.654776 kernel: ... version: 1 Dec 13 02:36:04.654781 kernel: ... bit width: 48 Dec 13 02:36:04.654787 kernel: ... generic registers: 4 Dec 13 02:36:04.654792 kernel: ... value mask: 0000ffffffffffff Dec 13 02:36:04.654798 kernel: ... max period: 000000007fffffff Dec 13 02:36:04.654804 kernel: ... fixed-purpose events: 0 Dec 13 02:36:04.654809 kernel: ... event mask: 000000000000000f Dec 13 02:36:04.654838 kernel: signal: max sigframe size: 1776 Dec 13 02:36:04.654848 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:36:04.654854 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:36:04.654860 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:36:04.654866 kernel: x86: Booting SMP configuration: Dec 13 02:36:04.656565 kernel: .... node #0, CPUs: #1 Dec 13 02:36:04.656576 kernel: Disabled fast string operations Dec 13 02:36:04.656582 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 02:36:04.656588 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 02:36:04.656594 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:36:04.656600 kernel: smpboot: Max logical packages: 128 Dec 13 02:36:04.656608 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 02:36:04.656614 kernel: devtmpfs: initialized Dec 13 02:36:04.656620 kernel: x86/mm: Memory block size: 128MB Dec 13 02:36:04.656625 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 02:36:04.656631 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:36:04.656637 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 02:36:04.656642 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:36:04.656648 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:36:04.656654 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:36:04.656661 kernel: audit: type=2000 audit(1734057363.059:1): state=initialized audit_enabled=0 res=1 Dec 13 02:36:04.656667 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:36:04.656673 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:36:04.656678 kernel: cpuidle: using governor menu Dec 13 02:36:04.656684 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 02:36:04.656690 kernel: ACPI: bus type PCI registered Dec 13 02:36:04.656696 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:36:04.656702 kernel: dca service started, version 1.12.1 Dec 13 02:36:04.656708 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 02:36:04.656714 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 02:36:04.656720 kernel: PCI: Using configuration type 1 for base access Dec 13 02:36:04.656726 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:36:04.656731 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:36:04.656737 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:36:04.656743 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:36:04.656748 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:36:04.656754 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:36:04.656760 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:36:04.656767 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:36:04.656772 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:36:04.656778 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:36:04.656784 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 02:36:04.656790 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 02:36:04.656796 kernel: ACPI: Interpreter enabled Dec 13 02:36:04.656801 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 02:36:04.656807 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:36:04.656813 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:36:04.656819 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 02:36:04.656825 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 02:36:04.656931 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:36:04.656984 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 02:36:04.657029 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 02:36:04.657037 kernel: PCI host bridge to bus 0000:00 Dec 13 02:36:04.657086 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:36:04.657130 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 02:36:04.657171 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 02:36:04.657212 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 02:36:04.657252 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 02:36:04.657291 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 02:36:04.657332 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:36:04.657371 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 02:36:04.657413 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 02:36:04.657465 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 02:36:04.657518 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 02:36:04.657569 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 02:36:04.658579 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 02:36:04.658633 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 02:36:04.658684 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 02:36:04.658734 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 02:36:04.658780 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 02:36:04.658849 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 02:36:04.658932 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 02:36:04.658980 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 02:36:04.659027 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 02:36:04.659078 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 02:36:04.659125 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 02:36:04.659171 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 02:36:04.659222 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 02:36:04.659268 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 02:36:04.659315 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 02:36:04.659363 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 02:36:04.659408 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 02:36:04.659453 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:36:04.659502 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 02:36:04.659555 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.659602 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.659652 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.659700 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.659751 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.659797 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.659849 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.659921 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.659972 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660021 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660089 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660136 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660187 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660234 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660287 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660337 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660386 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660433 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660485 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660532 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660581 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660631 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660681 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660729 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660783 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660831 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660893 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.660943 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.660993 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661041 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661100 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661147 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661196 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661246 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661297 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661345 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661393 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661440 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661499 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661556 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661609 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661656 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661705 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661752 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661803 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.661861 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.661963 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.662015 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.664850 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.664981 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665042 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.665091 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665146 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.665197 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665247 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.665294 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665346 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.665401 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665462 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.665509 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665559 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.665608 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665658 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:36:04.665705 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.665757 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 02:36:04.665806 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:36:04.665942 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 02:36:04.665953 kernel: acpiphp: Slot [32] registered Dec 13 02:36:04.665959 kernel: acpiphp: Slot [33] registered Dec 13 02:36:04.665965 kernel: acpiphp: Slot [34] registered Dec 13 02:36:04.665971 kernel: acpiphp: Slot [35] registered Dec 13 02:36:04.665977 kernel: acpiphp: Slot [36] registered Dec 13 02:36:04.665984 kernel: acpiphp: Slot [37] registered Dec 13 02:36:04.665990 kernel: acpiphp: Slot [38] registered Dec 13 02:36:04.665996 kernel: acpiphp: Slot [39] registered Dec 13 02:36:04.666002 kernel: acpiphp: Slot [40] registered Dec 13 02:36:04.666008 kernel: acpiphp: Slot [41] registered Dec 13 02:36:04.666014 kernel: acpiphp: Slot [42] registered Dec 13 02:36:04.666019 kernel: acpiphp: Slot [43] registered Dec 13 02:36:04.666025 kernel: acpiphp: Slot [44] registered Dec 13 02:36:04.666031 kernel: acpiphp: Slot [45] registered Dec 13 02:36:04.666037 kernel: acpiphp: Slot [46] registered Dec 13 02:36:04.666044 kernel: acpiphp: Slot [47] registered Dec 13 02:36:04.666050 kernel: acpiphp: Slot [48] registered Dec 13 02:36:04.666056 kernel: acpiphp: Slot [49] registered Dec 13 02:36:04.666061 kernel: acpiphp: Slot [50] registered Dec 13 02:36:04.666067 kernel: acpiphp: Slot [51] registered Dec 13 02:36:04.666073 kernel: acpiphp: Slot [52] registered Dec 13 02:36:04.666078 kernel: acpiphp: Slot [53] registered Dec 13 02:36:04.666084 kernel: acpiphp: Slot [54] registered Dec 13 02:36:04.666090 kernel: acpiphp: Slot [55] registered Dec 13 02:36:04.666096 kernel: acpiphp: Slot [56] registered Dec 13 02:36:04.666102 kernel: acpiphp: Slot [57] registered Dec 13 02:36:04.666108 kernel: acpiphp: Slot [58] registered Dec 13 02:36:04.666113 kernel: acpiphp: Slot [59] registered Dec 13 02:36:04.666119 kernel: acpiphp: Slot [60] registered Dec 13 02:36:04.666125 kernel: acpiphp: Slot [61] registered Dec 13 02:36:04.666131 kernel: acpiphp: Slot [62] registered Dec 13 02:36:04.666137 kernel: acpiphp: Slot [63] registered Dec 13 02:36:04.666188 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 02:36:04.666237 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:36:04.666282 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:36:04.666333 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:36:04.666396 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 02:36:04.666442 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 02:36:04.666488 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 02:36:04.666534 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 02:36:04.666582 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 02:36:04.666630 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 02:36:04.666676 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 02:36:04.666721 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 02:36:04.666774 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 02:36:04.666843 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 02:36:04.666924 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 02:36:04.666993 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:36:04.667044 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 02:36:04.669537 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:36:04.669594 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:36:04.669647 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:36:04.669704 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:36:04.669768 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:36:04.669823 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:36:04.669876 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:36:04.669932 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:36:04.669985 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:36:04.670035 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:36:04.670092 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:36:04.670137 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:36:04.670186 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:36:04.670242 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:36:04.670291 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:36:04.670340 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:36:04.670387 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:36:04.670435 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:36:04.670488 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:36:04.670550 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:36:04.670602 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:36:04.670656 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:36:04.670708 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:36:04.670775 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:36:04.670843 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:36:04.670921 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:36:04.670984 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:36:04.671075 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 02:36:04.671145 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 02:36:04.671207 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 02:36:04.671262 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 02:36:04.671315 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 02:36:04.671398 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:36:04.671467 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 02:36:04.671540 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 02:36:04.671598 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:36:04.671655 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:36:04.671720 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:36:04.671787 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:36:04.671861 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:36:04.671931 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:36:04.671988 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:36:04.672042 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:36:04.672091 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:36:04.672137 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:36:04.672184 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:36:04.672232 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:36:04.672284 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:36:04.672331 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:36:04.672380 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:36:04.672430 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:36:04.672484 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:36:04.672531 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:36:04.672578 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:36:04.672624 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:36:04.672673 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:36:04.672722 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:36:04.672770 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:36:04.672817 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:36:04.672868 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:36:04.672986 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:36:04.673032 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:36:04.673081 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:36:04.673126 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:36:04.673173 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:36:04.673221 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:36:04.673270 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:36:04.673317 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:36:04.673370 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:36:04.673429 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:36:04.673487 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:36:04.673537 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:36:04.673584 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:36:04.673631 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:36:04.673681 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:36:04.673726 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:36:04.673773 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:36:04.673820 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:36:04.673867 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:36:04.673938 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:36:04.674010 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:36:04.674067 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:36:04.674150 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:36:04.674220 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:36:04.674286 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:36:04.674349 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:36:04.674410 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:36:04.674463 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:36:04.674521 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:36:04.674576 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:36:04.674626 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:36:04.674672 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:36:04.674719 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:36:04.674768 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:36:04.674814 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:36:04.674900 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:36:04.674956 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:36:04.675021 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:36:04.675084 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:36:04.675135 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:36:04.675181 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:36:04.675228 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:36:04.675274 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:36:04.675321 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:36:04.675369 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:36:04.675415 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:36:04.675463 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:36:04.675515 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:36:04.675564 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:36:04.675611 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:36:04.675658 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:36:04.675704 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:36:04.675754 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:36:04.675801 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:36:04.675853 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:36:04.675862 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 02:36:04.675868 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 02:36:04.675884 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 02:36:04.675890 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:36:04.675896 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 02:36:04.675902 kernel: iommu: Default domain type: Translated Dec 13 02:36:04.675910 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:36:04.675959 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 02:36:04.676005 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:36:04.676052 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 02:36:04.676060 kernel: vgaarb: loaded Dec 13 02:36:04.676067 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:36:04.676072 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:36:04.676078 kernel: PTP clock support registered Dec 13 02:36:04.676086 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:36:04.676092 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:36:04.676099 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 02:36:04.676104 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 02:36:04.676110 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 02:36:04.676116 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 02:36:04.676122 kernel: clocksource: Switched to clocksource tsc-early Dec 13 02:36:04.676128 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:36:04.676134 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:36:04.676139 kernel: pnp: PnP ACPI init Dec 13 02:36:04.676192 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 02:36:04.676235 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 02:36:04.676278 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 02:36:04.676329 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 02:36:04.676381 kernel: pnp 00:06: [dma 2] Dec 13 02:36:04.676427 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 02:36:04.676471 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 02:36:04.676518 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 02:36:04.676527 kernel: pnp: PnP ACPI: found 8 devices Dec 13 02:36:04.676533 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:36:04.676540 kernel: NET: Registered PF_INET protocol family Dec 13 02:36:04.676546 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:36:04.676552 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 02:36:04.676558 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:36:04.676565 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:36:04.676571 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 02:36:04.676577 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 02:36:04.676582 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:36:04.676588 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:36:04.676594 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:36:04.676599 kernel: NET: Registered PF_XDP protocol family Dec 13 02:36:04.676647 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 02:36:04.676696 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 02:36:04.676751 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 02:36:04.676819 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 02:36:04.676876 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 02:36:04.676924 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 02:36:04.676970 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 02:36:04.677022 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 02:36:04.677069 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 02:36:04.677115 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 02:36:04.677162 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 02:36:04.677214 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 02:36:04.677282 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 02:36:04.677340 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 02:36:04.677388 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 02:36:04.677434 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 02:36:04.677482 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 02:36:04.677529 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 02:36:04.677575 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 02:36:04.677623 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 02:36:04.677671 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 02:36:04.677717 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 02:36:04.677773 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 02:36:04.677819 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:36:04.677875 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:36:04.677934 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.677980 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678025 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678071 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678130 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678177 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678223 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678268 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678315 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678370 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678427 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678472 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678517 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678568 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678625 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678680 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678738 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678791 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678853 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.678921 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.678973 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679019 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679065 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679111 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679159 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679206 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679251 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679297 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679342 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679389 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679436 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679481 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679531 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679578 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679632 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679681 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679739 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679785 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679831 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.679916 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.679971 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680017 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680063 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680108 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680158 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680207 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680254 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680299 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680345 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680393 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680439 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680484 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680529 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680574 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680621 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680667 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680713 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680759 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680806 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680854 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.680906 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.680952 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.683741 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.683807 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.683855 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.683910 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.683958 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.684005 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.684055 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.684101 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.684148 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.684219 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.684268 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.684315 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.684363 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.689641 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.689708 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.689759 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.689820 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.689897 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.689956 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.690006 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.690054 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:36:04.690101 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:36:04.690149 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:36:04.690196 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 02:36:04.690257 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:36:04.690318 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:36:04.690365 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:36:04.690416 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 02:36:04.690466 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:36:04.690514 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:36:04.690561 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:36:04.690607 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:36:04.690660 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:36:04.690709 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:36:04.693803 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:36:04.693862 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:36:04.693931 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:36:04.693984 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:36:04.694033 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:36:04.694081 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:36:04.694129 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:36:04.694176 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:36:04.694225 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:36:04.694277 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:36:04.694325 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:36:04.694372 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:36:04.694426 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:36:04.694489 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:36:04.694544 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:36:04.694612 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:36:04.694663 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:36:04.694709 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:36:04.694756 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:36:04.694802 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:36:04.694849 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:36:04.694937 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 02:36:04.694986 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:36:04.695035 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:36:04.695087 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:36:04.695133 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:36:04.695182 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:36:04.695228 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:36:04.695277 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:36:04.695323 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:36:04.695371 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:36:04.695419 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:36:04.695465 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:36:04.695525 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:36:04.695572 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:36:04.695618 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:36:04.695665 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:36:04.695713 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:36:04.695759 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:36:04.695808 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:36:04.695862 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:36:04.696168 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:36:04.696225 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:36:04.696279 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:36:04.696333 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:36:04.696381 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:36:04.696431 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:36:04.696479 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:36:04.696525 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:36:04.696573 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:36:04.696622 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:36:04.696669 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:36:04.696717 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:36:04.696764 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:36:04.696811 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:36:04.696864 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:36:04.696922 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:36:04.696971 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:36:04.697020 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:36:04.697067 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:36:04.697115 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:36:04.697162 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:36:04.697210 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:36:04.697256 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:36:04.697305 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:36:04.697353 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:36:04.697400 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:36:04.697450 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:36:04.697498 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:36:04.697545 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:36:04.697594 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:36:04.697643 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:36:04.697690 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:36:04.697741 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:36:04.697789 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:36:04.697839 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:36:04.699075 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:36:04.699135 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:36:04.699186 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:36:04.699254 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:36:04.699312 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:36:04.699360 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:36:04.699407 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:36:04.699454 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:36:04.699510 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:36:04.699566 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:36:04.699612 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:36:04.699660 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:36:04.699707 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:36:04.699775 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:36:04.699831 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:36:04.699944 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:36:04.699994 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:36:04.700043 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:36:04.700090 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:36:04.700136 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:36:04.700186 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:36:04.700232 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:36:04.700278 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:36:04.700329 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:36:04.700375 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:36:04.700432 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:36:04.700478 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:36:04.700519 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:36:04.700560 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:36:04.700601 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:36:04.700643 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:36:04.700686 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:36:04.700727 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:36:04.700768 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:36:04.700814 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 02:36:04.700882 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 02:36:04.701124 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:36:04.701174 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:36:04.701220 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:36:04.701265 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:36:04.701309 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:36:04.701352 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:36:04.701394 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:36:04.701437 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:36:04.701479 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:36:04.701529 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 02:36:04.701586 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 02:36:04.701631 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:36:04.701685 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 02:36:04.701890 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 02:36:04.702227 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:36:04.702285 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 02:36:04.702331 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 02:36:04.702377 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:36:04.702425 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 02:36:04.702469 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:36:04.702519 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 02:36:04.702572 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:36:04.702623 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 02:36:04.702671 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:36:04.702722 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 02:36:04.702766 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:36:04.702813 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 02:36:04.702857 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:36:04.702914 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 02:36:04.702960 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 02:36:04.703005 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:36:04.703052 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 02:36:04.703096 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 02:36:04.703139 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:36:04.703187 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 02:36:04.703233 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 02:36:04.703276 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:36:04.703329 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 02:36:04.703373 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:36:04.703423 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 02:36:04.703471 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:36:04.703519 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 02:36:04.703565 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:36:04.703611 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 02:36:04.703657 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:36:04.703703 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 02:36:04.703747 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:36:04.703795 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 02:36:04.703842 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 02:36:04.703906 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:36:04.703955 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 02:36:04.703999 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 02:36:04.704043 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:36:04.704093 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 02:36:04.704137 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 02:36:04.704183 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:36:04.704231 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 02:36:04.704275 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:36:04.704334 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 02:36:04.704391 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:36:04.704447 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 02:36:04.704496 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:36:04.704546 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 02:36:04.704590 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:36:04.704638 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 02:36:04.704684 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:36:04.704733 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 02:36:04.704778 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 02:36:04.704826 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:36:04.704920 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 02:36:04.704967 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 02:36:04.705010 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:36:04.705058 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 02:36:04.705104 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:36:04.705151 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 02:36:04.705195 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:36:04.705241 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 02:36:04.705284 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:36:04.705330 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 02:36:04.705375 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:36:04.705425 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 02:36:04.705468 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:36:04.705520 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 02:36:04.705563 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:36:04.705615 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:36:04.705625 kernel: PCI: CLS 32 bytes, default 64 Dec 13 02:36:04.705633 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:36:04.705640 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:36:04.705646 kernel: clocksource: Switched to clocksource tsc Dec 13 02:36:04.705652 kernel: Initialise system trusted keyrings Dec 13 02:36:04.705659 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 02:36:04.705665 kernel: Key type asymmetric registered Dec 13 02:36:04.705671 kernel: Asymmetric key parser 'x509' registered Dec 13 02:36:04.705677 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:36:04.705683 kernel: io scheduler mq-deadline registered Dec 13 02:36:04.705690 kernel: io scheduler kyber registered Dec 13 02:36:04.705696 kernel: io scheduler bfq registered Dec 13 02:36:04.705746 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 02:36:04.705795 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.705856 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 02:36:04.705928 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.705979 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 02:36:04.706026 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706077 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 02:36:04.706125 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706175 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 02:36:04.706222 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706270 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 02:36:04.706320 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706369 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 02:36:04.706431 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706484 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 02:36:04.706531 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706579 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 02:36:04.706629 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706678 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 02:36:04.706725 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706773 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 02:36:04.706820 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.706866 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 02:36:04.706965 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.707029 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 02:36:04.707082 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.707302 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 02:36:04.707360 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.707414 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 02:36:04.707467 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.707809 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 02:36:04.707868 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.707934 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 02:36:04.707987 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712147 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 02:36:04.712220 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712272 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 02:36:04.712323 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712371 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 02:36:04.712419 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712468 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 02:36:04.712518 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712565 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 02:36:04.712614 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712661 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 02:36:04.712709 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712762 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 02:36:04.712811 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.712859 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 02:36:04.714959 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.715018 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 02:36:04.715071 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.715122 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 02:36:04.715192 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.715243 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 02:36:04.715290 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.715739 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 02:36:04.715850 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.715971 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 02:36:04.716032 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.716082 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 02:36:04.716132 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.716181 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 02:36:04.716233 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:36:04.716242 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:36:04.716250 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:36:04.716257 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:36:04.716263 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 02:36:04.716270 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:36:04.716276 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:36:04.716329 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 02:36:04.716376 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T02:36:04 UTC (1734057364) Dec 13 02:36:04.716438 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 02:36:04.716448 kernel: fail to initialize ptp_kvm Dec 13 02:36:04.716454 kernel: intel_pstate: CPU model not supported Dec 13 02:36:04.716460 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:36:04.716467 kernel: Segment Routing with IPv6 Dec 13 02:36:04.716473 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:36:04.716479 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:36:04.716485 kernel: Key type dns_resolver registered Dec 13 02:36:04.716493 kernel: IPI shorthand broadcast: enabled Dec 13 02:36:04.716499 kernel: sched_clock: Marking stable (836389540, 218331255)->(1118349788, -63628993) Dec 13 02:36:04.716506 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:36:04.716512 kernel: registered taskstats version 1 Dec 13 02:36:04.716518 kernel: Loading compiled-in X.509 certificates Dec 13 02:36:04.716524 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:36:04.716530 kernel: Key type .fscrypt registered Dec 13 02:36:04.716537 kernel: Key type fscrypt-provisioning registered Dec 13 02:36:04.716544 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:36:04.716550 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:36:04.716556 kernel: ima: No architecture policies found Dec 13 02:36:04.716562 kernel: clk: Disabling unused clocks Dec 13 02:36:04.716569 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:36:04.716575 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:36:04.716581 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:36:04.716587 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:36:04.716593 kernel: Run /init as init process Dec 13 02:36:04.716601 kernel: with arguments: Dec 13 02:36:04.716607 kernel: /init Dec 13 02:36:04.716921 kernel: with environment: Dec 13 02:36:04.716929 kernel: HOME=/ Dec 13 02:36:04.716935 kernel: TERM=linux Dec 13 02:36:04.716942 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:36:04.716949 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:36:04.716957 systemd[1]: Detected virtualization vmware. Dec 13 02:36:04.716966 systemd[1]: Detected architecture x86-64. Dec 13 02:36:04.716973 systemd[1]: Running in initrd. Dec 13 02:36:04.716979 systemd[1]: No hostname configured, using default hostname. Dec 13 02:36:04.716985 systemd[1]: Hostname set to . Dec 13 02:36:04.716993 systemd[1]: Initializing machine ID from random generator. Dec 13 02:36:04.716999 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:36:04.717006 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:36:04.717013 systemd[1]: Reached target cryptsetup.target. Dec 13 02:36:04.717020 systemd[1]: Reached target paths.target. Dec 13 02:36:04.717027 systemd[1]: Reached target slices.target. Dec 13 02:36:04.717034 systemd[1]: Reached target swap.target. Dec 13 02:36:04.717040 systemd[1]: Reached target timers.target. Dec 13 02:36:04.717047 systemd[1]: Listening on iscsid.socket. Dec 13 02:36:04.717053 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:36:04.717060 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:36:04.717067 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:36:04.717074 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:36:04.717081 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:36:04.717087 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:36:04.717094 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:36:04.717100 systemd[1]: Reached target sockets.target. Dec 13 02:36:04.717107 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:36:04.717114 systemd[1]: Finished network-cleanup.service. Dec 13 02:36:04.717120 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:36:04.717127 systemd[1]: Starting systemd-journald.service... Dec 13 02:36:04.717134 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:36:04.717141 systemd[1]: Starting systemd-resolved.service... Dec 13 02:36:04.717148 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:36:04.717154 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:36:04.717161 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:36:04.717168 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:36:04.717174 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:36:04.717181 kernel: audit: type=1130 audit(1734057364.665:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.717187 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:36:04.717195 kernel: audit: type=1130 audit(1734057364.679:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.717202 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:36:04.717208 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:36:04.717215 systemd[1]: Started systemd-resolved.service. Dec 13 02:36:04.717221 kernel: audit: type=1130 audit(1734057364.688:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.717227 systemd[1]: Reached target nss-lookup.target. Dec 13 02:36:04.717234 kernel: Bridge firewalling registered Dec 13 02:36:04.717240 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:36:04.717248 kernel: audit: type=1130 audit(1734057364.707:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.717254 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:36:04.717261 kernel: SCSI subsystem initialized Dec 13 02:36:04.717271 systemd-journald[217]: Journal started Dec 13 02:36:04.717305 systemd-journald[217]: Runtime Journal (/run/log/journal/071550d276c841e7ab0f97eca34726cd) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:36:04.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.650896 systemd-modules-load[218]: Inserted module 'overlay' Dec 13 02:36:04.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.687316 systemd-resolved[219]: Positive Trust Anchors: Dec 13 02:36:04.721001 systemd[1]: Started systemd-journald.service. Dec 13 02:36:04.721017 kernel: audit: type=1130 audit(1734057364.717:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.687323 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:36:04.687343 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:36:04.689120 systemd-resolved[219]: Defaulting to hostname 'linux'. Dec 13 02:36:04.700956 systemd-modules-load[218]: Inserted module 'br_netfilter' Dec 13 02:36:04.723393 dracut-cmdline[233]: dracut-dracut-053 Dec 13 02:36:04.724656 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:36:04.729641 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:36:04.729673 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:36:04.729682 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:36:04.731562 systemd-modules-load[218]: Inserted module 'dm_multipath' Dec 13 02:36:04.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.731983 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:36:04.734927 kernel: audit: type=1130 audit(1734057364.730:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.734689 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:36:04.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.739226 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:36:04.741927 kernel: audit: type=1130 audit(1734057364.737:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.768893 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:36:04.779888 kernel: iscsi: registered transport (tcp) Dec 13 02:36:04.795315 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:36:04.795363 kernel: QLogic iSCSI HBA Driver Dec 13 02:36:04.812075 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:36:04.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.812718 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:36:04.815133 kernel: audit: type=1130 audit(1734057364.810:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:04.849897 kernel: raid6: avx2x4 gen() 46583 MB/s Dec 13 02:36:04.866894 kernel: raid6: avx2x4 xor() 20612 MB/s Dec 13 02:36:04.883898 kernel: raid6: avx2x2 gen() 53022 MB/s Dec 13 02:36:04.900895 kernel: raid6: avx2x2 xor() 31779 MB/s Dec 13 02:36:04.917887 kernel: raid6: avx2x1 gen() 44752 MB/s Dec 13 02:36:04.934894 kernel: raid6: avx2x1 xor() 27619 MB/s Dec 13 02:36:04.951892 kernel: raid6: sse2x4 gen() 20923 MB/s Dec 13 02:36:04.968892 kernel: raid6: sse2x4 xor() 11672 MB/s Dec 13 02:36:04.985889 kernel: raid6: sse2x2 gen() 20794 MB/s Dec 13 02:36:05.002888 kernel: raid6: sse2x2 xor() 13182 MB/s Dec 13 02:36:05.019895 kernel: raid6: sse2x1 gen() 17890 MB/s Dec 13 02:36:05.037135 kernel: raid6: sse2x1 xor() 8800 MB/s Dec 13 02:36:05.037186 kernel: raid6: using algorithm avx2x2 gen() 53022 MB/s Dec 13 02:36:05.037201 kernel: raid6: .... xor() 31779 MB/s, rmw enabled Dec 13 02:36:05.038334 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:36:05.046898 kernel: xor: automatically using best checksumming function avx Dec 13 02:36:05.112893 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:36:05.118163 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:36:05.118827 systemd[1]: Starting systemd-udevd.service... Dec 13 02:36:05.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:05.116000 audit: BPF prog-id=7 op=LOAD Dec 13 02:36:05.116000 audit: BPF prog-id=8 op=LOAD Dec 13 02:36:05.121889 kernel: audit: type=1130 audit(1734057365.116:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:05.130178 systemd-udevd[416]: Using default interface naming scheme 'v252'. Dec 13 02:36:05.133604 systemd[1]: Started systemd-udevd.service. Dec 13 02:36:05.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:05.134242 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:36:05.142414 dracut-pre-trigger[419]: rd.md=0: removing MD RAID activation Dec 13 02:36:05.159308 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:36:05.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:05.159885 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:36:05.222302 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:36:05.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:05.280142 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 02:36:05.280174 kernel: vmw_pvscsi: using 64bit dma Dec 13 02:36:05.288884 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 02:36:05.291320 kernel: vmw_pvscsi: max_id: 16 Dec 13 02:36:05.291340 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 02:36:05.293883 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 02:36:05.302081 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 02:36:05.306031 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 02:36:05.306057 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 02:36:05.306066 kernel: vmw_pvscsi: using MSI-X Dec 13 02:36:05.306073 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 02:36:05.306885 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:36:05.312886 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 02:36:05.315334 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 02:36:05.318679 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 02:36:05.318763 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:36:05.318772 kernel: AES CTR mode by8 optimization enabled Dec 13 02:36:05.322900 kernel: libata version 3.00 loaded. Dec 13 02:36:05.324898 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 02:36:05.334131 kernel: scsi host1: ata_piix Dec 13 02:36:05.334200 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 02:36:05.387460 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 02:36:05.387534 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 02:36:05.387595 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 02:36:05.387652 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 02:36:05.387709 kernel: scsi host2: ata_piix Dec 13 02:36:05.387776 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 02:36:05.387784 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 02:36:05.387791 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:36:05.387798 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 02:36:05.504929 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 02:36:05.509640 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 02:36:05.532961 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 02:36:05.548597 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 02:36:05.548610 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (468) Dec 13 02:36:05.548618 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 02:36:05.544587 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:36:05.548384 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:36:05.548580 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:36:05.551049 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:36:05.553017 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:36:05.553593 systemd[1]: Starting disk-uuid.service... Dec 13 02:36:05.579891 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:36:05.583885 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:36:06.630241 disk-uuid[549]: The operation has completed successfully. Dec 13 02:36:06.630884 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:36:06.919796 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:36:06.920084 systemd[1]: Finished disk-uuid.service. Dec 13 02:36:06.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:06.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:06.920805 systemd[1]: Starting verity-setup.service... Dec 13 02:36:06.930886 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:36:06.980810 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:36:06.981321 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:36:06.981613 systemd[1]: Finished verity-setup.service. Dec 13 02:36:06.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.032885 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:36:07.033348 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:36:07.033953 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 02:36:07.034393 systemd[1]: Starting ignition-setup.service... Dec 13 02:36:07.049416 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:36:07.049449 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:36:07.049457 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:36:07.054888 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:36:07.060509 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:36:07.066326 systemd[1]: Finished ignition-setup.service. Dec 13 02:36:07.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.066939 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:36:07.116574 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 02:36:07.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.117162 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:36:07.160003 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:36:07.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.158000 audit: BPF prog-id=9 op=LOAD Dec 13 02:36:07.160929 systemd[1]: Starting systemd-networkd.service... Dec 13 02:36:07.175274 systemd-networkd[733]: lo: Link UP Dec 13 02:36:07.175514 systemd-networkd[733]: lo: Gained carrier Dec 13 02:36:07.175930 systemd-networkd[733]: Enumeration completed Dec 13 02:36:07.176108 systemd[1]: Started systemd-networkd.service. Dec 13 02:36:07.176358 systemd[1]: Reached target network.target. Dec 13 02:36:07.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.176419 systemd-networkd[733]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 02:36:07.176848 systemd[1]: Starting iscsiuio.service... Dec 13 02:36:07.179994 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:36:07.180124 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:36:07.180384 systemd[1]: Started iscsiuio.service. Dec 13 02:36:07.180702 systemd-networkd[733]: ens192: Link UP Dec 13 02:36:07.180818 systemd-networkd[733]: ens192: Gained carrier Dec 13 02:36:07.181060 systemd[1]: Starting iscsid.service... Dec 13 02:36:07.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.183167 iscsid[738]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:36:07.183167 iscsid[738]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:36:07.183167 iscsid[738]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:36:07.183167 iscsid[738]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:36:07.183167 iscsid[738]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:36:07.184149 iscsid[738]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:36:07.184318 systemd[1]: Started iscsid.service. Dec 13 02:36:07.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.185004 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:36:07.191521 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:36:07.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.191881 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:36:07.192090 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:36:07.192300 systemd[1]: Reached target remote-fs.target. Dec 13 02:36:07.192950 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:36:07.197897 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:36:07.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.244279 ignition[605]: Ignition 2.14.0 Dec 13 02:36:07.244286 ignition[605]: Stage: fetch-offline Dec 13 02:36:07.244319 ignition[605]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:36:07.244334 ignition[605]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:36:07.247038 ignition[605]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:36:07.247115 ignition[605]: parsed url from cmdline: "" Dec 13 02:36:07.247117 ignition[605]: no config URL provided Dec 13 02:36:07.247119 ignition[605]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:36:07.247124 ignition[605]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:36:07.247482 ignition[605]: config successfully fetched Dec 13 02:36:07.247491 ignition[605]: parsing config with SHA512: 58c0c89a69baf7cd0b8482bc60228d0df50bdffb6d68675621327304e990d96784ddc908ccadf2e29399df0393eadb122be7f93f318c01b987bcec8cbf624fd1 Dec 13 02:36:07.253240 unknown[605]: fetched base config from "system" Dec 13 02:36:07.253475 ignition[605]: fetch-offline: fetch-offline passed Dec 13 02:36:07.253247 unknown[605]: fetched user config from "vmware" Dec 13 02:36:07.253535 ignition[605]: Ignition finished successfully Dec 13 02:36:07.254515 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:36:07.254684 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:36:07.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.255138 systemd[1]: Starting ignition-kargs.service... Dec 13 02:36:07.260418 ignition[753]: Ignition 2.14.0 Dec 13 02:36:07.260425 ignition[753]: Stage: kargs Dec 13 02:36:07.260504 ignition[753]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:36:07.260515 ignition[753]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:36:07.261781 ignition[753]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:36:07.263184 ignition[753]: kargs: kargs passed Dec 13 02:36:07.263218 ignition[753]: Ignition finished successfully Dec 13 02:36:07.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.264193 systemd[1]: Finished ignition-kargs.service. Dec 13 02:36:07.264790 systemd[1]: Starting ignition-disks.service... Dec 13 02:36:07.269485 ignition[759]: Ignition 2.14.0 Dec 13 02:36:07.269707 ignition[759]: Stage: disks Dec 13 02:36:07.270056 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:36:07.270223 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:36:07.271563 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:36:07.272667 ignition[759]: disks: disks passed Dec 13 02:36:07.272867 ignition[759]: Ignition finished successfully Dec 13 02:36:07.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.273422 systemd[1]: Finished ignition-disks.service. Dec 13 02:36:07.273585 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:36:07.273681 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:36:07.273768 systemd[1]: Reached target local-fs.target. Dec 13 02:36:07.273850 systemd[1]: Reached target sysinit.target. Dec 13 02:36:07.273964 systemd[1]: Reached target basic.target. Dec 13 02:36:07.274521 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:36:07.289030 systemd-fsck[767]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:36:07.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.290454 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:36:07.291001 systemd[1]: Mounting sysroot.mount... Dec 13 02:36:07.367883 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:36:07.367978 systemd[1]: Mounted sysroot.mount. Dec 13 02:36:07.368129 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:36:07.379661 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:36:07.380038 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:36:07.380062 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:36:07.380079 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:36:07.381535 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:36:07.382146 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:36:07.434328 initrd-setup-root[777]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:36:07.506532 initrd-setup-root[785]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:36:07.526186 initrd-setup-root[793]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:36:07.543263 initrd-setup-root[801]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:36:07.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.621889 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:36:07.622656 systemd[1]: Starting ignition-mount.service... Dec 13 02:36:07.623289 systemd[1]: Starting sysroot-boot.service... Dec 13 02:36:07.627673 bash[818]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 02:36:07.632788 ignition[819]: INFO : Ignition 2.14.0 Dec 13 02:36:07.633121 ignition[819]: INFO : Stage: mount Dec 13 02:36:07.633336 ignition[819]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:36:07.633490 ignition[819]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:36:07.635104 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:36:07.635716 ignition[819]: INFO : mount: mount passed Dec 13 02:36:07.635864 ignition[819]: INFO : Ignition finished successfully Dec 13 02:36:07.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.636464 systemd[1]: Finished ignition-mount.service. Dec 13 02:36:07.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:07.646444 systemd[1]: Finished sysroot-boot.service. Dec 13 02:36:08.060796 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:36:08.248895 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (827) Dec 13 02:36:08.265393 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:36:08.265438 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:36:08.265446 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:36:08.326898 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:36:08.331281 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:36:08.332454 systemd[1]: Starting ignition-files.service... Dec 13 02:36:08.344510 ignition[847]: INFO : Ignition 2.14.0 Dec 13 02:36:08.344510 ignition[847]: INFO : Stage: files Dec 13 02:36:08.344888 ignition[847]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:36:08.344888 ignition[847]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:36:08.346690 ignition[847]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:36:08.349254 ignition[847]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:36:08.349770 ignition[847]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:36:08.349770 ignition[847]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:36:08.352491 ignition[847]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:36:08.352834 ignition[847]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:36:08.353636 unknown[847]: wrote ssh authorized keys file for user: core Dec 13 02:36:08.353848 ignition[847]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:36:08.354171 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:36:08.354342 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:36:08.354514 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:36:08.354514 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:36:08.354859 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:36:08.354859 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:36:08.354859 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:36:08.354859 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:36:08.359526 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2123381015" Dec 13 02:36:08.360961 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (847) Dec 13 02:36:08.360979 ignition[847]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2123381015": device or resource busy Dec 13 02:36:08.360979 ignition[847]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2123381015", trying btrfs: device or resource busy Dec 13 02:36:08.360979 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2123381015" Dec 13 02:36:08.363137 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2123381015" Dec 13 02:36:08.363137 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2123381015" Dec 13 02:36:08.363722 systemd[1]: mnt-oem2123381015.mount: Deactivated successfully. Dec 13 02:36:08.364075 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2123381015" Dec 13 02:36:08.364075 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:36:08.364075 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:36:08.364634 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:36:08.916997 systemd-networkd[733]: ens192: Gained IPv6LL Dec 13 02:36:13.533510 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 02:36:13.818360 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:36:13.823121 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:36:13.823389 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:36:13.823582 ignition[847]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Dec 13 02:36:13.823721 ignition[847]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Dec 13 02:36:13.823860 ignition[847]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 02:36:13.824032 ignition[847]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:36:13.824420 ignition[847]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:36:13.824608 ignition[847]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 02:36:13.824758 ignition[847]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 02:36:13.824958 ignition[847]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 02:36:13.825105 ignition[847]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:36:13.825258 ignition[847]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:36:13.921929 ignition[847]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:36:13.922172 ignition[847]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:36:13.922411 ignition[847]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:36:13.922641 ignition[847]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:36:13.922818 ignition[847]: INFO : files: files passed Dec 13 02:36:13.922954 ignition[847]: INFO : Ignition finished successfully Dec 13 02:36:13.924499 systemd[1]: Finished ignition-files.service. Dec 13 02:36:13.927799 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 02:36:13.927815 kernel: audit: type=1130 audit(1734057373.922:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.925179 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:36:13.927896 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:36:13.928255 systemd[1]: Starting ignition-quench.service... Dec 13 02:36:13.930218 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:36:13.930268 systemd[1]: Finished ignition-quench.service. Dec 13 02:36:13.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.931919 initrd-setup-root-after-ignition[873]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:36:13.935772 kernel: audit: type=1130 audit(1734057373.929:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.935785 kernel: audit: type=1131 audit(1734057373.929:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.936022 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:36:13.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.936302 systemd[1]: Reached target ignition-complete.target. Dec 13 02:36:13.938908 kernel: audit: type=1130 audit(1734057373.934:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.939291 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:36:13.947216 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:36:13.947431 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:36:13.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.947754 systemd[1]: Reached target initrd-fs.target. Dec 13 02:36:13.952416 kernel: audit: type=1130 audit(1734057373.945:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.952430 kernel: audit: type=1131 audit(1734057373.945:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.952557 systemd[1]: Reached target initrd.target. Dec 13 02:36:13.952789 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:36:13.953381 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:36:13.959732 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:36:13.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.960383 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:36:13.963012 kernel: audit: type=1130 audit(1734057373.958:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.967321 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:36:13.967370 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:36:13.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.967936 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:36:13.972394 kernel: audit: type=1130 audit(1734057373.965:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.972408 kernel: audit: type=1131 audit(1734057373.965:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.972467 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:36:13.972694 systemd[1]: Stopped target timers.target. Dec 13 02:36:13.972930 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:36:13.973085 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:36:13.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.973365 systemd[1]: Stopped target initrd.target. Dec 13 02:36:13.975800 systemd[1]: Stopped target basic.target. Dec 13 02:36:13.975947 kernel: audit: type=1131 audit(1734057373.971:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.976060 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:36:13.976269 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:36:13.976476 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:36:13.976685 systemd[1]: Stopped target remote-fs.target. Dec 13 02:36:13.976891 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:36:13.977104 systemd[1]: Stopped target sysinit.target. Dec 13 02:36:13.977305 systemd[1]: Stopped target local-fs.target. Dec 13 02:36:13.977500 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:36:13.977700 systemd[1]: Stopped target swap.target. Dec 13 02:36:13.977905 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:36:13.978055 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:36:13.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.978317 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:36:13.978520 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:36:13.978671 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:36:13.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.978946 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:36:13.979104 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:36:13.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.979368 systemd[1]: Stopped target paths.target. Dec 13 02:36:13.979561 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:36:13.980897 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:36:13.981112 systemd[1]: Stopped target slices.target. Dec 13 02:36:13.981308 systemd[1]: Stopped target sockets.target. Dec 13 02:36:13.981515 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:36:13.981651 systemd[1]: Closed iscsid.socket. Dec 13 02:36:13.981865 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:36:13.982033 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:36:13.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.982309 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:36:13.982461 systemd[1]: Stopped ignition-files.service. Dec 13 02:36:13.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.983139 systemd[1]: Stopping ignition-mount.service... Dec 13 02:36:13.983819 systemd[1]: Stopping iscsiuio.service... Dec 13 02:36:13.984329 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:36:13.984557 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:36:13.984721 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:36:13.985010 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:36:13.985163 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:36:13.986741 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:36:13.989582 ignition[886]: INFO : Ignition 2.14.0 Dec 13 02:36:13.989582 ignition[886]: INFO : Stage: umount Dec 13 02:36:13.989582 ignition[886]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:36:13.989582 ignition[886]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:36:13.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.990366 ignition[886]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:36:13.990546 systemd[1]: Stopped iscsiuio.service. Dec 13 02:36:13.991038 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:36:13.991193 systemd[1]: Closed iscsiuio.socket. Dec 13 02:36:13.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.991381 ignition[886]: INFO : umount: umount passed Dec 13 02:36:13.991503 ignition[886]: INFO : Ignition finished successfully Dec 13 02:36:13.991804 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:36:13.992018 systemd[1]: Stopped ignition-mount.service. Dec 13 02:36:13.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.992304 systemd[1]: Stopped target network.target. Dec 13 02:36:13.992508 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:36:13.992661 systemd[1]: Stopped ignition-disks.service. Dec 13 02:36:13.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.992922 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:36:13.993073 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:36:13.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.993329 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:36:13.993478 systemd[1]: Stopped ignition-setup.service. Dec 13 02:36:13.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.993804 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:36:13.994106 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:36:13.997708 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:36:13.997970 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:36:13.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:13.998523 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:36:13.998677 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:36:14.000133 systemd[1]: Stopping network-cleanup.service... Dec 13 02:36:14.000422 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:36:14.000585 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:36:14.000827 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 02:36:13.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.001039 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 02:36:13.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.001313 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:36:14.001464 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:36:13.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.001755 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:36:14.000000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:36:14.002133 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:36:14.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.002445 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:36:14.003351 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:36:14.003764 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:36:14.003962 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:36:14.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.004935 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:36:14.005210 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:36:14.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.005761 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:36:14.005962 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:36:14.006194 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:36:14.006345 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:36:14.006569 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:36:14.006722 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:36:14.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.006996 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:36:14.007148 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:36:14.007372 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:36:14.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.007549 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:36:14.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.006000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:36:14.008450 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:36:14.008743 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:36:14.008916 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:36:14.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.009239 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:36:14.009392 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:36:14.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.009648 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:36:14.009803 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:36:14.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.010840 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:36:14.011278 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:36:14.011462 systemd[1]: Stopped network-cleanup.service. Dec 13 02:36:14.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.011969 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:36:14.012155 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:36:14.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.019283 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:36:14.148518 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:36:14.148787 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:36:14.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.149126 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:36:14.149343 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:36:14.149497 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:36:14.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:14.150186 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:36:14.157182 systemd[1]: Switching root. Dec 13 02:36:14.170989 systemd-journald[217]: Journal stopped Dec 13 02:36:17.237657 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Dec 13 02:36:17.237681 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:36:17.237689 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:36:17.237695 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:36:17.237700 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:36:17.237707 kernel: SELinux: policy capability open_perms=1 Dec 13 02:36:17.237713 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:36:17.237719 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:36:17.237725 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:36:17.237730 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:36:17.237736 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:36:17.237742 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:36:17.237749 systemd[1]: Successfully loaded SELinux policy in 93.516ms. Dec 13 02:36:17.237757 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.379ms. Dec 13 02:36:17.237764 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:36:17.237771 systemd[1]: Detected virtualization vmware. Dec 13 02:36:17.237779 systemd[1]: Detected architecture x86-64. Dec 13 02:36:17.237785 systemd[1]: Detected first boot. Dec 13 02:36:17.237792 systemd[1]: Initializing machine ID from random generator. Dec 13 02:36:17.237799 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:36:17.237805 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:36:17.237812 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:36:17.237819 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:36:17.237826 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:36:17.237834 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:36:17.237841 systemd[1]: Stopped iscsid.service. Dec 13 02:36:17.237847 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:36:17.237854 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:36:17.237860 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:36:17.237867 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:36:17.237883 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:36:17.239213 systemd[1]: Created slice system-getty.slice. Dec 13 02:36:17.239224 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:36:17.239232 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:36:17.239239 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:36:17.239245 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:36:17.239252 systemd[1]: Created slice user.slice. Dec 13 02:36:17.239259 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:36:17.239265 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:36:17.239274 systemd[1]: Set up automount boot.automount. Dec 13 02:36:17.239282 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:36:17.239290 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:36:17.239296 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:36:17.239303 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:36:17.239310 systemd[1]: Reached target integritysetup.target. Dec 13 02:36:17.239317 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:36:17.239324 systemd[1]: Reached target remote-fs.target. Dec 13 02:36:17.239331 systemd[1]: Reached target slices.target. Dec 13 02:36:17.239338 systemd[1]: Reached target swap.target. Dec 13 02:36:17.239345 systemd[1]: Reached target torcx.target. Dec 13 02:36:17.239352 systemd[1]: Reached target veritysetup.target. Dec 13 02:36:17.239359 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:36:17.239366 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:36:17.239373 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:36:17.239381 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:36:17.239388 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:36:17.239395 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:36:17.239402 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:36:17.239409 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:36:17.239415 systemd[1]: Mounting media.mount... Dec 13 02:36:17.239422 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:36:17.239431 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:36:17.239438 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:36:17.239445 systemd[1]: Mounting tmp.mount... Dec 13 02:36:17.239451 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:36:17.239458 systemd[1]: Starting ignition-delete-config.service... Dec 13 02:36:17.239465 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:36:17.239472 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:36:17.239479 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:36:17.239486 systemd[1]: Starting modprobe@drm.service... Dec 13 02:36:17.239494 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:36:17.239501 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:36:17.239508 systemd[1]: Starting modprobe@loop.service... Dec 13 02:36:17.239515 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:36:17.239523 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:36:17.239529 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:36:17.239536 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:36:17.239543 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:36:17.239550 systemd[1]: Stopped systemd-journald.service. Dec 13 02:36:17.239558 systemd[1]: Starting systemd-journald.service... Dec 13 02:36:17.239565 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:36:17.239572 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:36:17.239579 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:36:17.239585 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:36:17.239592 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:36:17.239599 systemd[1]: Stopped verity-setup.service. Dec 13 02:36:17.239606 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:36:17.239613 kernel: fuse: init (API version 7.34) Dec 13 02:36:17.239621 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:36:17.239628 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:36:17.239634 systemd[1]: Mounted media.mount. Dec 13 02:36:17.239642 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:36:17.239649 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:36:17.239656 systemd[1]: Mounted tmp.mount. Dec 13 02:36:17.239663 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:36:17.239670 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:36:17.239677 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:36:17.239685 kernel: loop: module loaded Dec 13 02:36:17.239692 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:36:17.239699 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:36:17.239706 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:36:17.239712 systemd[1]: Finished modprobe@drm.service. Dec 13 02:36:17.239720 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:36:17.239727 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:36:17.239733 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:36:17.239741 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:36:17.239748 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:36:17.239755 systemd[1]: Finished modprobe@loop.service. Dec 13 02:36:17.239762 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:36:17.239769 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:36:17.239779 systemd-journald[1007]: Journal started Dec 13 02:36:17.239813 systemd-journald[1007]: Runtime Journal (/run/log/journal/8714af950cfd4713b88653c972f829eb) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:36:14.433000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:36:15.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:36:17.242488 systemd[1]: Started systemd-journald.service. Dec 13 02:36:15.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:36:15.011000 audit: BPF prog-id=10 op=LOAD Dec 13 02:36:15.011000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:36:15.011000 audit: BPF prog-id=11 op=LOAD Dec 13 02:36:15.011000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:36:15.305000 audit[919]: AVC avc: denied { associate } for pid=919 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:36:15.305000 audit[919]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=902 pid=919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:15.305000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:36:15.306000 audit[919]: AVC avc: denied { associate } for pid=919 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:36:15.306000 audit[919]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=902 pid=919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:15.306000 audit: CWD cwd="/" Dec 13 02:36:15.306000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:15.306000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:15.306000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:36:17.112000 audit: BPF prog-id=12 op=LOAD Dec 13 02:36:17.112000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:36:17.112000 audit: BPF prog-id=13 op=LOAD Dec 13 02:36:17.112000 audit: BPF prog-id=14 op=LOAD Dec 13 02:36:17.112000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:36:17.112000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:36:17.114000 audit: BPF prog-id=15 op=LOAD Dec 13 02:36:17.114000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:36:17.114000 audit: BPF prog-id=16 op=LOAD Dec 13 02:36:17.114000 audit: BPF prog-id=17 op=LOAD Dec 13 02:36:17.114000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:36:17.114000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:36:17.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.125000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:36:17.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.186000 audit: BPF prog-id=18 op=LOAD Dec 13 02:36:17.186000 audit: BPF prog-id=19 op=LOAD Dec 13 02:36:17.186000 audit: BPF prog-id=20 op=LOAD Dec 13 02:36:17.186000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:36:17.186000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:36:17.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.230000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:36:17.230000 audit[1007]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff5ee7ddd0 a2=4000 a3=7fff5ee7de6c items=0 ppid=1 pid=1007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:17.230000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:36:17.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.113386 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:36:15.304704 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:36:17.117272 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:36:15.305246 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:36:17.240998 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:36:15.305261 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:36:17.241711 systemd[1]: Reached target network-pre.target. Dec 13 02:36:15.305283 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:36:17.243627 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:36:15.305290 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:36:17.246320 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:36:15.305310 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:36:17.246912 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:36:15.305318 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:36:17.250098 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:36:15.305453 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:36:17.250738 jq[986]: true Dec 13 02:36:15.305479 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:36:15.305487 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:36:15.306300 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:36:17.251107 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:36:15.306323 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:36:17.251241 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:36:15.306336 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:36:15.306345 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:36:15.306355 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:36:17.252270 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:36:15.306364 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:36:17.252399 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:36:16.916154 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:36:17.253078 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:36:16.916330 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:36:17.254053 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:36:16.916405 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:36:17.254192 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:36:16.916512 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:36:17.256211 jq[1016]: true Dec 13 02:36:16.916551 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:36:16.916597 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2024-12-13T02:36:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:36:17.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.263245 systemd-journald[1007]: Time spent on flushing to /var/log/journal/8714af950cfd4713b88653c972f829eb is 63.032ms for 1996 entries. Dec 13 02:36:17.263245 systemd-journald[1007]: System Journal (/var/log/journal/8714af950cfd4713b88653c972f829eb) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:36:17.350954 systemd-journald[1007]: Received client request to flush runtime journal. Dec 13 02:36:17.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.262452 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:36:17.262624 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:36:17.273355 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:36:17.293287 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:36:17.351488 udevadm[1051]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 02:36:17.294275 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:36:17.322893 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:36:17.323856 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:36:17.337741 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:36:17.338686 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:36:17.351912 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:36:17.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.376850 ignition[1021]: Ignition 2.14.0 Dec 13 02:36:17.377566 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:36:17.377041 ignition[1021]: deleting config from guestinfo properties Dec 13 02:36:17.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.379300 ignition[1021]: Successfully deleted config Dec 13 02:36:17.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.379847 systemd[1]: Finished ignition-delete-config.service. Dec 13 02:36:17.689741 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:36:17.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.688000 audit: BPF prog-id=21 op=LOAD Dec 13 02:36:17.688000 audit: BPF prog-id=22 op=LOAD Dec 13 02:36:17.688000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:36:17.688000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:36:17.690841 systemd[1]: Starting systemd-udevd.service... Dec 13 02:36:17.701813 systemd-udevd[1052]: Using default interface naming scheme 'v252'. Dec 13 02:36:17.718959 systemd[1]: Started systemd-udevd.service. Dec 13 02:36:17.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.717000 audit: BPF prog-id=23 op=LOAD Dec 13 02:36:17.720242 systemd[1]: Starting systemd-networkd.service... Dec 13 02:36:17.726000 audit: BPF prog-id=24 op=LOAD Dec 13 02:36:17.727000 audit: BPF prog-id=25 op=LOAD Dec 13 02:36:17.727000 audit: BPF prog-id=26 op=LOAD Dec 13 02:36:17.729317 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:36:17.747082 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:36:17.752543 systemd[1]: Started systemd-userdbd.service. Dec 13 02:36:17.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.791468 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:36:17.788000 audit[1062]: AVC avc: denied { confidentiality } for pid=1062 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:36:17.788000 audit[1062]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d2a4a8af90 a1=337fc a2=7fad38fa3bc5 a3=5 items=110 ppid=1052 pid=1062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:17.788000 audit: CWD cwd="/" Dec 13 02:36:17.788000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=1 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=2 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=3 name=(null) inode=24725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=4 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=5 name=(null) inode=24726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=6 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=7 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=8 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=9 name=(null) inode=24728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=10 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=11 name=(null) inode=24729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=12 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=13 name=(null) inode=24730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=14 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=15 name=(null) inode=24731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=16 name=(null) inode=24727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=17 name=(null) inode=24732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=18 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=19 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=20 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=21 name=(null) inode=24734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=22 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=23 name=(null) inode=24735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=24 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=25 name=(null) inode=24736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=26 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=27 name=(null) inode=24737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=28 name=(null) inode=24733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=29 name=(null) inode=24738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=30 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=31 name=(null) inode=24739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=32 name=(null) inode=24739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=33 name=(null) inode=24740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=34 name=(null) inode=24739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=35 name=(null) inode=24741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=36 name=(null) inode=24739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=37 name=(null) inode=24742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=38 name=(null) inode=24739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=39 name=(null) inode=24743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=40 name=(null) inode=24739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=41 name=(null) inode=24744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=42 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=43 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=44 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=45 name=(null) inode=24746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=46 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=47 name=(null) inode=24747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=48 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=49 name=(null) inode=24748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=50 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=51 name=(null) inode=24749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=52 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=53 name=(null) inode=24750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=55 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=56 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=57 name=(null) inode=24752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=58 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=59 name=(null) inode=24753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=60 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=61 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=62 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=63 name=(null) inode=24755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=64 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=65 name=(null) inode=24756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=66 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=67 name=(null) inode=24757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=68 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=69 name=(null) inode=24758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=70 name=(null) inode=24754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=71 name=(null) inode=24759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=72 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=73 name=(null) inode=24760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=74 name=(null) inode=24760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=75 name=(null) inode=24761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=76 name=(null) inode=24760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=77 name=(null) inode=24762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=78 name=(null) inode=24760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=79 name=(null) inode=24763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=80 name=(null) inode=24760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=81 name=(null) inode=24764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=82 name=(null) inode=24760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=83 name=(null) inode=24765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.798497 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 02:36:17.804424 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 02:36:17.804519 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:36:17.804538 kernel: Guest personality initialized and is active Dec 13 02:36:17.788000 audit: PATH item=84 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=85 name=(null) inode=24766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=86 name=(null) inode=24766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=87 name=(null) inode=24767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=88 name=(null) inode=24766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=89 name=(null) inode=24768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=90 name=(null) inode=24766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=91 name=(null) inode=24769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=92 name=(null) inode=24766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=93 name=(null) inode=24770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=94 name=(null) inode=24766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=95 name=(null) inode=24771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=96 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=97 name=(null) inode=24772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=98 name=(null) inode=24772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=99 name=(null) inode=24773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=100 name=(null) inode=24772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=101 name=(null) inode=24774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=102 name=(null) inode=24772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=103 name=(null) inode=24775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=104 name=(null) inode=24772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=105 name=(null) inode=24776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=106 name=(null) inode=24772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=107 name=(null) inode=24777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PATH item=109 name=(null) inode=24778 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:36:17.788000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:36:17.806438 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 02:36:17.810403 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 02:36:17.810428 kernel: Initialized host personality Dec 13 02:36:17.809985 systemd-networkd[1060]: lo: Link UP Dec 13 02:36:17.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.809992 systemd-networkd[1060]: lo: Gained carrier Dec 13 02:36:17.810283 systemd-networkd[1060]: Enumeration completed Dec 13 02:36:17.810349 systemd[1]: Started systemd-networkd.service. Dec 13 02:36:17.810547 systemd-networkd[1060]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 02:36:17.813326 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:36:17.813451 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:36:17.813532 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 02:36:17.814722 systemd-networkd[1060]: ens192: Link UP Dec 13 02:36:17.814805 systemd-networkd[1060]: ens192: Gained carrier Dec 13 02:36:17.839954 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1068) Dec 13 02:36:17.864046 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:36:17.895887 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:36:17.904906 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:36:17.910193 (udev-worker)[1059]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 02:36:17.923109 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:36:17.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.924071 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:36:17.940251 lvm[1085]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:36:17.960544 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:36:17.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.960744 systemd[1]: Reached target cryptsetup.target. Dec 13 02:36:17.961690 systemd[1]: Starting lvm2-activation.service... Dec 13 02:36:17.964354 lvm[1086]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:36:17.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:17.981534 systemd[1]: Finished lvm2-activation.service. Dec 13 02:36:17.981714 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:36:17.981810 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:36:17.981823 systemd[1]: Reached target local-fs.target. Dec 13 02:36:17.981927 systemd[1]: Reached target machines.target. Dec 13 02:36:17.982876 systemd[1]: Starting ldconfig.service... Dec 13 02:36:17.983400 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:36:17.983431 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:36:17.984206 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:36:17.984899 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:36:17.985725 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:36:17.986593 systemd[1]: Starting systemd-sysext.service... Dec 13 02:36:17.993951 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1088 (bootctl) Dec 13 02:36:17.994733 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:36:17.999303 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:36:18.007639 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:36:18.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.012091 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:36:18.012217 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:36:18.028894 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:36:18.418514 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:36:18.419219 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:36:18.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.538895 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:36:18.627885 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:36:18.807184 systemd-fsck[1098]: fsck.fat 4.2 (2021-01-31) Dec 13 02:36:18.807184 systemd-fsck[1098]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:36:18.807860 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:36:18.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.808861 systemd[1]: Mounting boot.mount... Dec 13 02:36:18.825702 (sd-sysext)[1101]: Using extensions 'kubernetes'. Dec 13 02:36:18.826675 (sd-sysext)[1101]: Merged extensions into '/usr'. Dec 13 02:36:18.845388 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:36:18.846391 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:36:18.847124 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:36:18.848856 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:36:18.849587 systemd[1]: Starting modprobe@loop.service... Dec 13 02:36:18.849718 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:36:18.849788 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:36:18.849892 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:36:18.851306 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:36:18.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.852168 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:36:18.852274 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:36:18.852564 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:36:18.852628 systemd[1]: Finished modprobe@loop.service. Dec 13 02:36:18.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.852933 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:36:18.852999 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:36:18.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.853338 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:36:18.853405 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:36:18.853995 systemd[1]: Finished systemd-sysext.service. Dec 13 02:36:18.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:18.855469 systemd[1]: Starting ensure-sysext.service... Dec 13 02:36:18.856250 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:36:18.859930 systemd[1]: Reloading. Dec 13 02:36:18.868496 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:36:18.883239 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:36:18.887581 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:36:18.897121 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2024-12-13T02:36:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:36:18.897144 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2024-12-13T02:36:18Z" level=info msg="torcx already run" Dec 13 02:36:18.960715 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:36:18.960727 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:36:18.974457 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:36:19.009000 audit: BPF prog-id=27 op=LOAD Dec 13 02:36:19.012653 kernel: kauditd_printk_skb: 242 callbacks suppressed Dec 13 02:36:19.012690 kernel: audit: type=1334 audit(1734057379.009:165): prog-id=27 op=LOAD Dec 13 02:36:19.012704 kernel: audit: type=1334 audit(1734057379.011:166): prog-id=28 op=LOAD Dec 13 02:36:19.011000 audit: BPF prog-id=28 op=LOAD Dec 13 02:36:19.013632 kernel: audit: type=1334 audit(1734057379.012:167): prog-id=21 op=UNLOAD Dec 13 02:36:19.012000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:36:19.013000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:36:19.015373 kernel: audit: type=1334 audit(1734057379.013:168): prog-id=22 op=UNLOAD Dec 13 02:36:19.014000 audit: BPF prog-id=29 op=LOAD Dec 13 02:36:19.016000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:36:19.018885 kernel: audit: type=1334 audit(1734057379.014:169): prog-id=29 op=LOAD Dec 13 02:36:19.018914 kernel: audit: type=1334 audit(1734057379.016:170): prog-id=18 op=UNLOAD Dec 13 02:36:19.018928 kernel: audit: type=1334 audit(1734057379.017:171): prog-id=30 op=LOAD Dec 13 02:36:19.017000 audit: BPF prog-id=30 op=LOAD Dec 13 02:36:19.017000 audit: BPF prog-id=31 op=LOAD Dec 13 02:36:19.023888 kernel: audit: type=1334 audit(1734057379.017:172): prog-id=31 op=LOAD Dec 13 02:36:19.023932 kernel: audit: type=1334 audit(1734057379.017:173): prog-id=19 op=UNLOAD Dec 13 02:36:19.023949 kernel: audit: type=1334 audit(1734057379.017:174): prog-id=20 op=UNLOAD Dec 13 02:36:19.017000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:36:19.017000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:36:19.019000 audit: BPF prog-id=32 op=LOAD Dec 13 02:36:19.019000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:36:19.020000 audit: BPF prog-id=33 op=LOAD Dec 13 02:36:19.021000 audit: BPF prog-id=34 op=LOAD Dec 13 02:36:19.021000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:36:19.021000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:36:19.021000 audit: BPF prog-id=35 op=LOAD Dec 13 02:36:19.021000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:36:19.025397 systemd[1]: Mounted boot.mount. Dec 13 02:36:19.035546 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:36:19.037463 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:36:19.038267 systemd[1]: Starting modprobe@loop.service... Dec 13 02:36:19.038938 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:36:19.039256 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:36:19.039725 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:36:19.039816 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:36:19.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.040525 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:36:19.040816 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:36:19.040900 systemd[1]: Finished modprobe@loop.service. Dec 13 02:36:19.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.041145 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:36:19.042868 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:36:19.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.042968 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:36:19.044225 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:36:19.045527 systemd[1]: Starting modprobe@loop.service... Dec 13 02:36:19.045689 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:36:19.045763 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:36:19.045843 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:36:19.047583 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:36:19.047660 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:36:19.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.049018 systemd[1]: Starting modprobe@drm.service... Dec 13 02:36:19.050990 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:36:19.051166 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:36:19.051236 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:36:19.052268 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:36:19.053241 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:36:19.053319 systemd[1]: Finished modprobe@loop.service. Dec 13 02:36:19.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.053669 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:36:19.053736 systemd[1]: Finished modprobe@drm.service. Dec 13 02:36:19.054042 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:36:19.054107 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:36:19.054468 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:36:19.054524 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:36:19.055121 systemd[1]: Finished ensure-sysext.service. Dec 13 02:36:19.091217 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:36:19.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.092376 systemd[1]: Starting audit-rules.service... Dec 13 02:36:19.092000 audit: BPF prog-id=36 op=LOAD Dec 13 02:36:19.094000 audit: BPF prog-id=37 op=LOAD Dec 13 02:36:19.093245 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:36:19.094062 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:36:19.095403 systemd[1]: Starting systemd-resolved.service... Dec 13 02:36:19.096828 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:36:19.098250 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:36:19.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.107070 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:36:19.107256 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:36:19.106000 audit[1203]: SYSTEM_BOOT pid=1203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.110341 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:36:19.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:19.130614 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:36:19.147000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:36:19.147000 audit[1217]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce80fbcb0 a2=420 a3=0 items=0 ppid=1197 pid=1217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:19.147000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:36:19.149164 augenrules[1217]: No rules Dec 13 02:36:19.150023 systemd[1]: Finished audit-rules.service. Dec 13 02:36:19.154522 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:36:19.154657 systemd[1]: Reached target time-set.target. Dec 13 02:36:19.161483 systemd-resolved[1201]: Positive Trust Anchors: Dec 13 02:36:19.161493 systemd-resolved[1201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:36:19.161513 systemd-resolved[1201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:36:19.183207 systemd-resolved[1201]: Defaulting to hostname 'linux'. Dec 13 02:36:19.184363 systemd[1]: Started systemd-resolved.service. Dec 13 02:36:19.184516 systemd[1]: Reached target network.target. Dec 13 02:36:19.184603 systemd[1]: Reached target nss-lookup.target. Dec 13 02:36:19.189314 ldconfig[1087]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:36:19.203178 systemd[1]: Finished ldconfig.service. Dec 13 02:36:19.204225 systemd[1]: Starting systemd-update-done.service... Dec 13 02:36:19.207379 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:36:19.207394 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:36:19.208302 systemd[1]: Finished systemd-update-done.service. Dec 13 02:36:19.208456 systemd[1]: Reached target sysinit.target. Dec 13 02:36:19.208599 systemd[1]: Started motdgen.path. Dec 13 02:36:19.208698 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:36:19.208891 systemd[1]: Started logrotate.timer. Dec 13 02:36:19.209016 systemd[1]: Started mdadm.timer. Dec 13 02:36:19.209129 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:36:19.209221 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:36:19.209248 systemd[1]: Reached target paths.target. Dec 13 02:36:19.209332 systemd[1]: Reached target timers.target. Dec 13 02:36:19.209576 systemd[1]: Listening on dbus.socket. Dec 13 02:36:19.210507 systemd[1]: Starting docker.socket... Dec 13 02:36:19.212465 systemd[1]: Listening on sshd.socket. Dec 13 02:36:19.212632 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:36:19.212887 systemd[1]: Listening on docker.socket. Dec 13 02:36:19.213016 systemd[1]: Reached target sockets.target. Dec 13 02:36:19.213106 systemd[1]: Reached target basic.target. Dec 13 02:36:19.213221 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:36:19.213241 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:36:19.214137 systemd[1]: Starting containerd.service... Dec 13 02:36:19.215484 systemd[1]: Starting dbus.service... Dec 13 02:36:19.216380 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:36:19.219623 jq[1228]: false Dec 13 02:36:19.218610 systemd[1]: Starting extend-filesystems.service... Dec 13 02:36:19.218754 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:36:19.219691 systemd[1]: Starting motdgen.service... Dec 13 02:36:19.220652 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:36:19.222300 systemd[1]: Starting sshd-keygen.service... Dec 13 02:36:19.223899 systemd-networkd[1060]: ens192: Gained IPv6LL Dec 13 02:36:19.224305 systemd[1]: Starting systemd-logind.service... Dec 13 02:36:19.224584 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:36:19.224632 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:36:19.226963 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:36:19.227477 systemd[1]: Starting update-engine.service... Dec 13 02:36:19.228379 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:36:19.229238 systemd[1]: Starting vmtoolsd.service... Dec 13 02:36:19.231225 jq[1240]: true Dec 13 02:36:19.229785 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:36:19.230394 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:36:19.230492 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:36:19.230663 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:36:19.230741 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:36:19.232752 systemd[1]: Reached target network-online.target. Dec 13 02:36:19.235774 systemd[1]: Starting kubelet.service... Dec 13 02:36:19.238017 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:36:19.238132 systemd[1]: Finished motdgen.service. Dec 13 02:36:19.246353 jq[1243]: true Dec 13 02:36:19.252681 systemd[1]: Started vmtoolsd.service. Dec 13 02:36:19.267322 extend-filesystems[1229]: Found loop1 Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda1 Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda2 Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda3 Dec 13 02:36:19.267322 extend-filesystems[1229]: Found usr Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda4 Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda6 Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda7 Dec 13 02:36:19.267322 extend-filesystems[1229]: Found sda9 Dec 13 02:36:19.267322 extend-filesystems[1229]: Checking size of /dev/sda9 Dec 13 02:36:19.281336 dbus-daemon[1227]: [system] SELinux support is enabled Dec 13 02:36:19.281453 systemd[1]: Started dbus.service. Dec 13 02:36:19.282788 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:36:19.282805 systemd[1]: Reached target system-config.target. Dec 13 02:36:19.282924 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:36:19.282934 systemd[1]: Reached target user-config.target. Dec 13 02:36:19.291239 extend-filesystems[1229]: Old size kept for /dev/sda9 Dec 13 02:36:19.291239 extend-filesystems[1229]: Found sr0 Dec 13 02:36:19.291421 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:36:19.291524 systemd[1]: Finished extend-filesystems.service. Dec 13 02:36:19.311716 kernel: NET: Registered PF_VSOCK protocol family Dec 13 02:36:19.322334 update_engine[1238]: I1213 02:36:19.319447 1238 main.cc:92] Flatcar Update Engine starting Dec 13 02:36:19.322897 bash[1276]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:36:19.323493 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:36:19.324367 systemd[1]: Started update-engine.service. Dec 13 02:36:19.325738 systemd[1]: Started locksmithd.service. Dec 13 02:36:19.326144 update_engine[1238]: I1213 02:36:19.326125 1238 update_check_scheduler.cc:74] Next update check in 9m5s Dec 13 02:36:19.326923 env[1244]: time="2024-12-13T02:36:19.326865326Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:36:19.336337 systemd-logind[1233]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:36:19.336352 systemd-logind[1233]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:37:29.455431 systemd-resolved[1201]: Clock change detected. Flushing caches. Dec 13 02:37:29.455619 systemd-timesyncd[1202]: Contacted time server 23.168.24.210:123 (0.flatcar.pool.ntp.org). Dec 13 02:37:29.455706 systemd-timesyncd[1202]: Initial clock synchronization to Fri 2024-12-13 02:37:29.455401 UTC. Dec 13 02:37:29.456013 systemd-logind[1233]: New seat seat0. Dec 13 02:37:29.460747 systemd[1]: Started systemd-logind.service. Dec 13 02:37:29.492967 env[1244]: time="2024-12-13T02:37:29.492928877Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:37:29.493043 env[1244]: time="2024-12-13T02:37:29.493025565Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:37:29.494591 env[1244]: time="2024-12-13T02:37:29.494566283Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:37:29.494591 env[1244]: time="2024-12-13T02:37:29.494583349Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:37:29.494701 env[1244]: time="2024-12-13T02:37:29.494686568Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:37:29.494701 env[1244]: time="2024-12-13T02:37:29.494698516Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:37:29.494754 env[1244]: time="2024-12-13T02:37:29.494706343Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:37:29.494754 env[1244]: time="2024-12-13T02:37:29.494712166Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:37:29.494789 env[1244]: time="2024-12-13T02:37:29.494756485Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:37:29.495371 env[1244]: time="2024-12-13T02:37:29.494896431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:37:29.495371 env[1244]: time="2024-12-13T02:37:29.494972254Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:37:29.495371 env[1244]: time="2024-12-13T02:37:29.494984092Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:37:29.495371 env[1244]: time="2024-12-13T02:37:29.495020346Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:37:29.495371 env[1244]: time="2024-12-13T02:37:29.495030747Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:37:29.502420 env[1244]: time="2024-12-13T02:37:29.502389657Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:37:29.502420 env[1244]: time="2024-12-13T02:37:29.502419622Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502429382Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502456332Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502467061Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502475104Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502482003Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502489599Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502496653Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502505427Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502512241Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502533 env[1244]: time="2024-12-13T02:37:29.502519369Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:37:29.502689 env[1244]: time="2024-12-13T02:37:29.502585390Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:37:29.502689 env[1244]: time="2024-12-13T02:37:29.502636653Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:37:29.502800 env[1244]: time="2024-12-13T02:37:29.502783791Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:37:29.502833 env[1244]: time="2024-12-13T02:37:29.502803977Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502833 env[1244]: time="2024-12-13T02:37:29.502816533Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:37:29.502866 env[1244]: time="2024-12-13T02:37:29.502853424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502882 env[1244]: time="2024-12-13T02:37:29.502866756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502901 env[1244]: time="2024-12-13T02:37:29.502879030Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502901 env[1244]: time="2024-12-13T02:37:29.502890197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502935 env[1244]: time="2024-12-13T02:37:29.502902472Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502935 env[1244]: time="2024-12-13T02:37:29.502913081Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502935 env[1244]: time="2024-12-13T02:37:29.502920112Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502935 env[1244]: time="2024-12-13T02:37:29.502926369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.502997 env[1244]: time="2024-12-13T02:37:29.502934754Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:37:29.503014 env[1244]: time="2024-12-13T02:37:29.502999424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.503014 env[1244]: time="2024-12-13T02:37:29.503007906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.503048 env[1244]: time="2024-12-13T02:37:29.503016923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.503048 env[1244]: time="2024-12-13T02:37:29.503024364Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:37:29.503048 env[1244]: time="2024-12-13T02:37:29.503032941Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:37:29.503048 env[1244]: time="2024-12-13T02:37:29.503039632Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:37:29.503120 env[1244]: time="2024-12-13T02:37:29.503050653Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:37:29.503120 env[1244]: time="2024-12-13T02:37:29.503073292Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:37:29.503435 env[1244]: time="2024-12-13T02:37:29.503203166Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:37:29.503435 env[1244]: time="2024-12-13T02:37:29.503239986Z" level=info msg="Connect containerd service" Dec 13 02:37:29.503435 env[1244]: time="2024-12-13T02:37:29.503261201Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:37:29.506463 env[1244]: time="2024-12-13T02:37:29.503741208Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:37:29.506463 env[1244]: time="2024-12-13T02:37:29.503870402Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:37:29.506463 env[1244]: time="2024-12-13T02:37:29.503892525Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:37:29.506463 env[1244]: time="2024-12-13T02:37:29.504472316Z" level=info msg="containerd successfully booted in 0.083265s" Dec 13 02:37:29.503976 systemd[1]: Started containerd.service. Dec 13 02:37:29.507275 env[1244]: time="2024-12-13T02:37:29.506638741Z" level=info msg="Start subscribing containerd event" Dec 13 02:37:29.507275 env[1244]: time="2024-12-13T02:37:29.506714610Z" level=info msg="Start recovering state" Dec 13 02:37:29.507275 env[1244]: time="2024-12-13T02:37:29.506756140Z" level=info msg="Start event monitor" Dec 13 02:37:29.507275 env[1244]: time="2024-12-13T02:37:29.506773161Z" level=info msg="Start snapshots syncer" Dec 13 02:37:29.507275 env[1244]: time="2024-12-13T02:37:29.506779644Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:37:29.507275 env[1244]: time="2024-12-13T02:37:29.506786226Z" level=info msg="Start streaming server" Dec 13 02:37:29.797555 locksmithd[1286]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:37:30.316848 sshd_keygen[1259]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:37:30.329184 systemd[1]: Finished sshd-keygen.service. Dec 13 02:37:30.330331 systemd[1]: Starting issuegen.service... Dec 13 02:37:30.333607 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:37:30.333696 systemd[1]: Finished issuegen.service. Dec 13 02:37:30.334784 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:37:30.352199 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:37:30.353159 systemd[1]: Started getty@tty1.service. Dec 13 02:37:30.353951 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:37:30.354141 systemd[1]: Reached target getty.target. Dec 13 02:37:31.316224 systemd[1]: Started kubelet.service. Dec 13 02:37:31.316570 systemd[1]: Reached target multi-user.target. Dec 13 02:37:31.317556 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:37:31.322637 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:37:31.322772 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:37:31.322962 systemd[1]: Startup finished in 877ms (kernel) + 9.746s (initrd) + 6.913s (userspace) = 17.537s. Dec 13 02:37:31.349913 login[1351]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 02:37:31.351247 login[1350]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:37:31.359784 systemd[1]: Created slice user-500.slice. Dec 13 02:37:31.360614 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:37:31.363393 systemd-logind[1233]: New session 1 of user core. Dec 13 02:37:31.366883 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:37:31.367892 systemd[1]: Starting user@500.service... Dec 13 02:37:31.370184 (systemd)[1357]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:37:31.487834 systemd[1357]: Queued start job for default target default.target. Dec 13 02:37:31.488374 systemd[1357]: Reached target paths.target. Dec 13 02:37:31.488449 systemd[1357]: Reached target sockets.target. Dec 13 02:37:31.488559 systemd[1357]: Reached target timers.target. Dec 13 02:37:31.488616 systemd[1357]: Reached target basic.target. Dec 13 02:37:31.488694 systemd[1357]: Reached target default.target. Dec 13 02:37:31.488734 systemd[1]: Started user@500.service. Dec 13 02:37:31.488798 systemd[1357]: Startup finished in 114ms. Dec 13 02:37:31.489629 systemd[1]: Started session-1.scope. Dec 13 02:37:32.302994 kubelet[1354]: E1213 02:37:32.302949 1354 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:37:32.304553 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:37:32.304658 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:37:32.351295 login[1351]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:37:32.353637 systemd-logind[1233]: New session 2 of user core. Dec 13 02:37:32.354346 systemd[1]: Started session-2.scope. Dec 13 02:37:42.555191 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:37:42.555318 systemd[1]: Stopped kubelet.service. Dec 13 02:37:42.556282 systemd[1]: Starting kubelet.service... Dec 13 02:37:42.666614 systemd[1]: Started kubelet.service. Dec 13 02:37:42.721767 kubelet[1387]: E1213 02:37:42.721736 1387 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:37:42.723895 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:37:42.723968 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:37:52.898028 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:37:52.898167 systemd[1]: Stopped kubelet.service. Dec 13 02:37:52.899202 systemd[1]: Starting kubelet.service... Dec 13 02:37:53.028565 systemd[1]: Started kubelet.service. Dec 13 02:37:53.089702 kubelet[1397]: E1213 02:37:53.089669 1397 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:37:53.090904 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:37:53.090982 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:38:03.148000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 02:38:03.148133 systemd[1]: Stopped kubelet.service. Dec 13 02:38:03.149137 systemd[1]: Starting kubelet.service... Dec 13 02:38:03.375719 systemd[1]: Started kubelet.service. Dec 13 02:38:03.413161 kubelet[1407]: E1213 02:38:03.413094 1407 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:38:03.414217 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:38:03.414292 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:38:09.487905 systemd[1]: Created slice system-sshd.slice. Dec 13 02:38:09.489385 systemd[1]: Started sshd@0-139.178.70.107:22-147.75.109.163:33166.service. Dec 13 02:38:09.660876 sshd[1414]: Accepted publickey for core from 147.75.109.163 port 33166 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:09.661856 sshd[1414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:09.664669 systemd[1]: Started session-3.scope. Dec 13 02:38:09.664956 systemd-logind[1233]: New session 3 of user core. Dec 13 02:38:09.711775 systemd[1]: Started sshd@1-139.178.70.107:22-147.75.109.163:33176.service. Dec 13 02:38:09.749314 sshd[1419]: Accepted publickey for core from 147.75.109.163 port 33176 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:09.750523 sshd[1419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:09.753327 systemd-logind[1233]: New session 4 of user core. Dec 13 02:38:09.753791 systemd[1]: Started session-4.scope. Dec 13 02:38:09.805533 sshd[1419]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:09.805704 systemd[1]: Started sshd@2-139.178.70.107:22-147.75.109.163:33178.service. Dec 13 02:38:09.806984 systemd[1]: sshd@1-139.178.70.107:22-147.75.109.163:33176.service: Deactivated successfully. Dec 13 02:38:09.807376 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:38:09.808690 systemd-logind[1233]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:38:09.809107 systemd-logind[1233]: Removed session 4. Dec 13 02:38:09.844078 sshd[1424]: Accepted publickey for core from 147.75.109.163 port 33178 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:09.845033 sshd[1424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:09.848379 systemd[1]: Started session-5.scope. Dec 13 02:38:09.849425 systemd-logind[1233]: New session 5 of user core. Dec 13 02:38:09.897993 sshd[1424]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:09.900173 systemd[1]: sshd@2-139.178.70.107:22-147.75.109.163:33178.service: Deactivated successfully. Dec 13 02:38:09.900543 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:38:09.901173 systemd-logind[1233]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:38:09.901918 systemd[1]: Started sshd@3-139.178.70.107:22-147.75.109.163:33180.service. Dec 13 02:38:09.902882 systemd-logind[1233]: Removed session 5. Dec 13 02:38:09.941513 sshd[1431]: Accepted publickey for core from 147.75.109.163 port 33180 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:09.942412 sshd[1431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:09.944968 systemd-logind[1233]: New session 6 of user core. Dec 13 02:38:09.945470 systemd[1]: Started session-6.scope. Dec 13 02:38:09.995057 sshd[1431]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:09.997088 systemd[1]: sshd@3-139.178.70.107:22-147.75.109.163:33180.service: Deactivated successfully. Dec 13 02:38:09.997471 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:38:09.997875 systemd-logind[1233]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:38:09.998586 systemd[1]: Started sshd@4-139.178.70.107:22-147.75.109.163:33184.service. Dec 13 02:38:09.999161 systemd-logind[1233]: Removed session 6. Dec 13 02:38:10.036828 sshd[1437]: Accepted publickey for core from 147.75.109.163 port 33184 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:10.037614 sshd[1437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:10.040125 systemd-logind[1233]: New session 7 of user core. Dec 13 02:38:10.040596 systemd[1]: Started session-7.scope. Dec 13 02:38:10.230208 sudo[1440]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:38:10.230407 sudo[1440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:38:10.242449 dbus-daemon[1227]: Ѝp\u001b\xafU: received setenforce notice (enforcing=-1294819744) Dec 13 02:38:10.242998 sudo[1440]: pam_unix(sudo:session): session closed for user root Dec 13 02:38:10.252085 sshd[1437]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:10.255511 systemd[1]: Started sshd@5-139.178.70.107:22-147.75.109.163:33196.service. Dec 13 02:38:10.257104 systemd[1]: sshd@4-139.178.70.107:22-147.75.109.163:33184.service: Deactivated successfully. Dec 13 02:38:10.257667 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:38:10.258706 systemd-logind[1233]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:38:10.259412 systemd-logind[1233]: Removed session 7. Dec 13 02:38:10.294970 sshd[1443]: Accepted publickey for core from 147.75.109.163 port 33196 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:10.296044 sshd[1443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:10.298995 systemd[1]: Started session-8.scope. Dec 13 02:38:10.299884 systemd-logind[1233]: New session 8 of user core. Dec 13 02:38:10.348311 sudo[1448]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:38:10.348659 sudo[1448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:38:10.350597 sudo[1448]: pam_unix(sudo:session): session closed for user root Dec 13 02:38:10.353950 sudo[1447]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:38:10.354122 sudo[1447]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:38:10.360428 systemd[1]: Stopping audit-rules.service... Dec 13 02:38:10.359000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:38:10.364980 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:38:10.365025 kernel: audit: type=1305 audit(1734057490.359:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:38:10.359000 audit[1451]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc685edcf0 a2=420 a3=0 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:10.366767 auditctl[1451]: No rules Dec 13 02:38:10.370411 kernel: audit: type=1300 audit(1734057490.359:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc685edcf0 a2=420 a3=0 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:10.367058 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:38:10.359000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:38:10.367179 systemd[1]: Stopped audit-rules.service. Dec 13 02:38:10.370749 systemd[1]: Starting audit-rules.service... Dec 13 02:38:10.372375 kernel: audit: type=1327 audit(1734057490.359:207): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:38:10.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.375389 kernel: audit: type=1131 audit(1734057490.365:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.382338 augenrules[1468]: No rules Dec 13 02:38:10.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.382812 systemd[1]: Finished audit-rules.service. Dec 13 02:38:10.383489 sudo[1447]: pam_unix(sudo:session): session closed for user root Dec 13 02:38:10.384824 sshd[1443]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:10.388372 kernel: audit: type=1130 audit(1734057490.381:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.389159 systemd[1]: Started sshd@6-139.178.70.107:22-147.75.109.163:33202.service. Dec 13 02:38:10.389854 systemd[1]: sshd@5-139.178.70.107:22-147.75.109.163:33196.service: Deactivated successfully. Dec 13 02:38:10.390255 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:38:10.382000 audit[1447]: USER_END pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.393761 systemd-logind[1233]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:38:10.396785 kernel: audit: type=1106 audit(1734057490.382:210): pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.396828 kernel: audit: type=1104 audit(1734057490.382:211): pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.382000 audit[1447]: CRED_DISP pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.400626 kernel: audit: type=1106 audit(1734057490.387:212): pid=1443 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.387000 audit[1443]: USER_END pid=1443 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.400821 systemd-logind[1233]: Removed session 8. Dec 13 02:38:10.387000 audit[1443]: CRED_DISP pid=1443 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.404082 kernel: audit: type=1104 audit(1734057490.387:213): pid=1443 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:33202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.406944 kernel: audit: type=1130 audit(1734057490.387:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:33202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.107:22-147.75.109.163:33196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.426000 audit[1473]: USER_ACCT pid=1473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.427939 sshd[1473]: Accepted publickey for core from 147.75.109.163 port 33202 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:10.427000 audit[1473]: CRED_ACQ pid=1473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.427000 audit[1473]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5c6cf4e0 a2=3 a3=0 items=0 ppid=1 pid=1473 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:10.427000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:10.428783 sshd[1473]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:10.431063 systemd-logind[1233]: New session 9 of user core. Dec 13 02:38:10.431851 systemd[1]: Started session-9.scope. Dec 13 02:38:10.433000 audit[1473]: USER_START pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.434000 audit[1476]: CRED_ACQ pid=1476 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:10.479000 audit[1477]: USER_ACCT pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.481412 sudo[1477]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:38:10.481545 sudo[1477]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:38:10.480000 audit[1477]: CRED_REFR pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.481000 audit[1477]: USER_START pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.488210 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Dec 13 02:38:10.490665 systemd[1]: Starting coreos-metadata.service... Dec 13 02:38:10.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:10.509261 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 02:38:10.509422 systemd[1]: Finished coreos-metadata.service. Dec 13 02:38:11.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:11.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:11.517163 systemd[1]: Stopped kubelet.service. Dec 13 02:38:11.518697 systemd[1]: Starting kubelet.service... Dec 13 02:38:11.531122 systemd[1]: Reloading. Dec 13 02:38:11.586983 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2024-12-13T02:38:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:38:11.587193 /usr/lib/systemd/system-generators/torcx-generator[1543]: time="2024-12-13T02:38:11Z" level=info msg="torcx already run" Dec 13 02:38:11.649064 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:38:11.649174 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:38:11.660794 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit: BPF prog-id=43 op=LOAD Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.703000 audit: BPF prog-id=44 op=LOAD Dec 13 02:38:11.703000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:38:11.703000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.704000 audit: BPF prog-id=45 op=LOAD Dec 13 02:38:11.704000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit: BPF prog-id=46 op=LOAD Dec 13 02:38:11.706000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit: BPF prog-id=47 op=LOAD Dec 13 02:38:11.707000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit: BPF prog-id=48 op=LOAD Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit: BPF prog-id=49 op=LOAD Dec 13 02:38:11.708000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:38:11.708000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.708000 audit: BPF prog-id=50 op=LOAD Dec 13 02:38:11.708000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:38:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit: BPF prog-id=51 op=LOAD Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.709000 audit: BPF prog-id=52 op=LOAD Dec 13 02:38:11.709000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:38:11.709000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit: BPF prog-id=53 op=LOAD Dec 13 02:38:11.711000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit: BPF prog-id=54 op=LOAD Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.711000 audit: BPF prog-id=55 op=LOAD Dec 13 02:38:11.712000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:38:11.712000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.712000 audit: BPF prog-id=56 op=LOAD Dec 13 02:38:11.712000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:11.713000 audit: BPF prog-id=57 op=LOAD Dec 13 02:38:11.713000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:38:11.727942 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:38:11.727981 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:38:11.728091 systemd[1]: Stopped kubelet.service. Dec 13 02:38:11.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:38:11.729118 systemd[1]: Starting kubelet.service... Dec 13 02:38:12.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:12.111828 systemd[1]: Started kubelet.service. Dec 13 02:38:12.152245 kubelet[1609]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:38:12.152475 kubelet[1609]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:38:12.152517 kubelet[1609]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:38:12.165856 kubelet[1609]: I1213 02:38:12.165756 1609 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:38:12.387237 kubelet[1609]: I1213 02:38:12.387182 1609 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:38:12.387237 kubelet[1609]: I1213 02:38:12.387200 1609 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:38:12.387615 kubelet[1609]: I1213 02:38:12.387600 1609 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:38:12.603738 kubelet[1609]: I1213 02:38:12.603712 1609 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:38:12.656860 kubelet[1609]: I1213 02:38:12.656829 1609 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:38:12.665041 kubelet[1609]: I1213 02:38:12.664986 1609 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:38:12.665159 kubelet[1609]: I1213 02:38:12.665037 1609 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.139","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:38:12.665239 kubelet[1609]: I1213 02:38:12.665166 1609 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:38:12.665239 kubelet[1609]: I1213 02:38:12.665175 1609 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:38:12.665286 kubelet[1609]: I1213 02:38:12.665260 1609 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:38:12.674340 kubelet[1609]: I1213 02:38:12.674297 1609 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:38:12.674340 kubelet[1609]: I1213 02:38:12.674326 1609 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:38:12.674340 kubelet[1609]: I1213 02:38:12.674347 1609 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:38:12.674466 kubelet[1609]: I1213 02:38:12.674370 1609 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:38:12.674761 kubelet[1609]: E1213 02:38:12.674750 1609 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:12.674942 kubelet[1609]: E1213 02:38:12.674933 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:12.694544 kubelet[1609]: W1213 02:38:12.694496 1609 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:38:12.694657 kubelet[1609]: E1213 02:38:12.694648 1609 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:38:12.694781 kubelet[1609]: W1213 02:38:12.694771 1609 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.67.124.139" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:38:12.694840 kubelet[1609]: E1213 02:38:12.694832 1609 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.124.139" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:38:12.704423 kubelet[1609]: I1213 02:38:12.704398 1609 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:38:12.709525 kubelet[1609]: I1213 02:38:12.709504 1609 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:38:12.709599 kubelet[1609]: W1213 02:38:12.709554 1609 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:38:12.709909 kubelet[1609]: I1213 02:38:12.709896 1609 server.go:1264] "Started kubelet" Dec 13 02:38:12.710024 kubelet[1609]: I1213 02:38:12.710009 1609 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:38:12.710693 kubelet[1609]: I1213 02:38:12.710684 1609 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:38:12.813994 kubelet[1609]: I1213 02:38:12.813921 1609 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:38:12.814211 kubelet[1609]: I1213 02:38:12.814196 1609 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:38:12.860000 audit[1609]: AVC avc: denied { mac_admin } for pid=1609 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:12.860000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:38:12.860000 audit[1609]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b320c0 a1=c0009571d0 a2=c000b32090 a3=25 items=0 ppid=1 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:12.860000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:38:12.861998 kubelet[1609]: I1213 02:38:12.861981 1609 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:38:12.860000 audit[1609]: AVC avc: denied { mac_admin } for pid=1609 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:12.860000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:38:12.860000 audit[1609]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fef20 a1=c0009571e8 a2=c000b32150 a3=25 items=0 ppid=1 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:12.860000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:38:12.862214 kubelet[1609]: I1213 02:38:12.862204 1609 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:38:12.862286 kubelet[1609]: I1213 02:38:12.862279 1609 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:38:12.875838 kubelet[1609]: I1213 02:38:12.875822 1609 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:38:12.876325 kubelet[1609]: I1213 02:38:12.876316 1609 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:38:12.876422 kubelet[1609]: I1213 02:38:12.876416 1609 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:38:12.897846 kubelet[1609]: I1213 02:38:12.897819 1609 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:38:12.898007 kubelet[1609]: I1213 02:38:12.897923 1609 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:38:12.898882 kubelet[1609]: E1213 02:38:12.898854 1609 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 02:38:12.899317 kubelet[1609]: I1213 02:38:12.899221 1609 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:38:12.929206 kubelet[1609]: E1213 02:38:12.927931 1609 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a2913b488 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:12.709880968 +0000 UTC m=+0.595118726,LastTimestamp:2024-12-13 02:38:12.709880968 +0000 UTC m=+0.595118726,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:12.929206 kubelet[1609]: W1213 02:38:12.928083 1609 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 02:38:12.929206 kubelet[1609]: E1213 02:38:12.928101 1609 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 02:38:12.929345 kubelet[1609]: I1213 02:38:12.929310 1609 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:38:12.929345 kubelet[1609]: I1213 02:38:12.929317 1609 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:38:12.929345 kubelet[1609]: I1213 02:38:12.929327 1609 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:38:12.944387 kubelet[1609]: E1213 02:38:12.944316 1609 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a361b7208 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.139 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:12.92849204 +0000 UTC m=+0.813729793,LastTimestamp:2024-12-13 02:38:12.92849204 +0000 UTC m=+0.813729793,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:12.946729 kubelet[1609]: E1213 02:38:12.946680 1609 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a361b9675 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.139 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:12.928501365 +0000 UTC m=+0.813739119,LastTimestamp:2024-12-13 02:38:12.928501365 +0000 UTC m=+0.813739119,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:12.949497 kubelet[1609]: E1213 02:38:12.949418 1609 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a361ba3c9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.139 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:12.928504777 +0000 UTC m=+0.813742531,LastTimestamp:2024-12-13 02:38:12.928504777 +0000 UTC m=+0.813742531,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:12.977017 kubelet[1609]: I1213 02:38:12.976989 1609 kubelet_node_status.go:73] "Attempting to register node" node="10.67.124.139" Dec 13 02:38:12.981405 kubelet[1609]: E1213 02:38:12.981301 1609 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.139.18109c1a361b7208\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a361b7208 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.139 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:12.92849204 +0000 UTC m=+0.813729793,LastTimestamp:2024-12-13 02:38:12.976925416 +0000 UTC m=+0.862163169,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:12.984644 kubelet[1609]: I1213 02:38:12.983644 1609 policy_none.go:49] "None policy: Start" Dec 13 02:38:12.985238 kubelet[1609]: E1213 02:38:12.985196 1609 kubelet_node_status.go:96] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.124.139" Dec 13 02:38:12.985343 kubelet[1609]: I1213 02:38:12.985331 1609 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:38:12.985414 kubelet[1609]: I1213 02:38:12.985348 1609 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:38:12.991656 kubelet[1609]: E1213 02:38:12.991565 1609 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.139.18109c1a361b9675\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a361b9675 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.139 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:12.928501365 +0000 UTC m=+0.813739119,LastTimestamp:2024-12-13 02:38:12.976964412 +0000 UTC m=+0.862202165,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:12.993070 systemd[1]: Created slice kubepods.slice. Dec 13 02:38:12.994594 kubelet[1609]: E1213 02:38:12.994523 1609 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.139.18109c1a361ba3c9\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a361ba3c9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.139 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:12.928504777 +0000 UTC m=+0.813742531,LastTimestamp:2024-12-13 02:38:12.97696644 +0000 UTC m=+0.862204194,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:12.999183 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:38:13.003045 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:38:13.006000 audit[1624]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.006000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe9ba4f720 a2=0 a3=7ffe9ba4f70c items=0 ppid=1609 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:38:13.008565 kubelet[1609]: I1213 02:38:13.008552 1609 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:38:13.007000 audit[1609]: AVC avc: denied { mac_admin } for pid=1609 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:13.007000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:38:13.007000 audit[1628]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.007000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffdf6069350 a2=0 a3=7ffdf606933c items=0 ppid=1609 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:38:13.007000 audit[1609]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d6cfc0 a1=c000e80720 a2=c000d6cf90 a3=25 items=0 ppid=1 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:38:13.010483 kubelet[1609]: I1213 02:38:13.010469 1609 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:38:13.010674 kubelet[1609]: I1213 02:38:13.010645 1609 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:38:13.010792 kubelet[1609]: I1213 02:38:13.010781 1609 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:38:13.011598 kubelet[1609]: E1213 02:38:13.011590 1609 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.139\" not found" Dec 13 02:38:13.023955 kubelet[1609]: E1213 02:38:13.023901 1609 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.139.18109c1a3af337cb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.139,UID:10.67.124.139,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.139,},FirstTimestamp:2024-12-13 02:38:13.009741771 +0000 UTC m=+0.894979529,LastTimestamp:2024-12-13 02:38:13.009741771 +0000 UTC m=+0.894979529,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.139,}" Dec 13 02:38:13.010000 audit[1630]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.010000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd9c2a9390 a2=0 a3=7ffd9c2a937c items=0 ppid=1609 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:38:13.030000 audit[1635]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.030000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf04d2db0 a2=0 a3=7ffcf04d2d9c items=0 ppid=1609 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:38:13.101709 kubelet[1609]: E1213 02:38:13.101684 1609 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.139\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Dec 13 02:38:13.127000 audit[1640]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.127000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc2a975690 a2=0 a3=7ffc2a97567c items=0 ppid=1609 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:38:13.129735 kubelet[1609]: I1213 02:38:13.129705 1609 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:38:13.129000 audit[1641]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:13.129000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd16ec76e0 a2=0 a3=7ffd16ec76cc items=0 ppid=1609 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:38:13.130711 kubelet[1609]: I1213 02:38:13.130610 1609 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:38:13.130711 kubelet[1609]: I1213 02:38:13.130624 1609 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:38:13.130711 kubelet[1609]: I1213 02:38:13.130641 1609 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:38:13.130711 kubelet[1609]: E1213 02:38:13.130671 1609 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 02:38:13.130000 audit[1642]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.130000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd894dbc80 a2=0 a3=10e3 items=0 ppid=1609 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:38:13.130000 audit[1643]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:13.130000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc879904b0 a2=0 a3=7ffc8799049c items=0 ppid=1609 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:38:13.131000 audit[1644]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.131000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe110f7850 a2=0 a3=7ffe110f783c items=0 ppid=1609 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.131000 audit[1645]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:13.131000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd4038df30 a2=0 a3=7ffd4038df1c items=0 ppid=1609 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:38:13.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:38:13.132000 audit[1646]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:13.132000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc364be9c0 a2=0 a3=7ffc364be9ac items=0 ppid=1609 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:38:13.133000 audit[1647]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:13.133000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2534a0f0 a2=0 a3=7ffc2534a0dc items=0 ppid=1609 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:38:13.187666 kubelet[1609]: I1213 02:38:13.185744 1609 kubelet_node_status.go:73] "Attempting to register node" node="10.67.124.139" Dec 13 02:38:13.202246 kubelet[1609]: I1213 02:38:13.202222 1609 kubelet_node_status.go:76] "Successfully registered node" node="10.67.124.139" Dec 13 02:38:13.209066 kubelet[1609]: E1213 02:38:13.209042 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:13.309856 kubelet[1609]: E1213 02:38:13.309831 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:13.388433 kubelet[1609]: I1213 02:38:13.388406 1609 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 02:38:13.388690 kubelet[1609]: W1213 02:38:13.388677 1609 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:38:13.411065 kubelet[1609]: E1213 02:38:13.411037 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:13.512025 kubelet[1609]: E1213 02:38:13.511783 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:13.612750 kubelet[1609]: E1213 02:38:13.612687 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:13.675915 kubelet[1609]: E1213 02:38:13.675889 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:13.713441 kubelet[1609]: E1213 02:38:13.713409 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:13.814321 kubelet[1609]: E1213 02:38:13.814134 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:13.914787 kubelet[1609]: E1213 02:38:13.914762 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:14.015932 kubelet[1609]: E1213 02:38:14.015885 1609 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.139\" not found" Dec 13 02:38:14.117370 kubelet[1609]: I1213 02:38:14.117185 1609 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 02:38:14.118324 env[1244]: time="2024-12-13T02:38:14.118062649Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:38:14.118731 kubelet[1609]: I1213 02:38:14.118715 1609 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 02:38:14.139000 audit[1477]: USER_END pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:14.139000 audit[1477]: CRED_DISP pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:38:14.140521 sudo[1477]: pam_unix(sudo:session): session closed for user root Dec 13 02:38:14.141921 sshd[1473]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:14.141000 audit[1473]: USER_END pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:14.141000 audit[1473]: CRED_DISP pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:14.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-147.75.109.163:33202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:14.143732 systemd-logind[1233]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:38:14.144173 systemd[1]: sshd@6-139.178.70.107:22-147.75.109.163:33202.service: Deactivated successfully. Dec 13 02:38:14.144689 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:38:14.145320 systemd-logind[1233]: Removed session 9. Dec 13 02:38:14.676144 kubelet[1609]: E1213 02:38:14.676113 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:14.676424 kubelet[1609]: I1213 02:38:14.676129 1609 apiserver.go:52] "Watching apiserver" Dec 13 02:38:14.679644 kubelet[1609]: I1213 02:38:14.679620 1609 topology_manager.go:215] "Topology Admit Handler" podUID="51d0329d-de65-4714-9a38-e9946fe58dcb" podNamespace="kube-system" podName="kube-proxy-gldhx" Dec 13 02:38:14.679800 kubelet[1609]: I1213 02:38:14.679789 1609 topology_manager.go:215] "Topology Admit Handler" podUID="a73bc3d0-895c-498f-91ae-97b4e0a098c0" podNamespace="calico-system" podName="calico-node-qp9cg" Dec 13 02:38:14.679911 kubelet[1609]: I1213 02:38:14.679901 1609 topology_manager.go:215] "Topology Admit Handler" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" podNamespace="calico-system" podName="csi-node-driver-lwtlv" Dec 13 02:38:14.680102 kubelet[1609]: E1213 02:38:14.680088 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwtlv" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" Dec 13 02:38:14.683004 systemd[1]: Created slice kubepods-besteffort-poda73bc3d0_895c_498f_91ae_97b4e0a098c0.slice. Dec 13 02:38:14.698011 systemd[1]: Created slice kubepods-besteffort-pod51d0329d_de65_4714_9a38_e9946fe58dcb.slice. Dec 13 02:38:14.777246 kubelet[1609]: I1213 02:38:14.777224 1609 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:38:14.785186 kubelet[1609]: I1213 02:38:14.785171 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/51d0329d-de65-4714-9a38-e9946fe58dcb-xtables-lock\") pod \"kube-proxy-gldhx\" (UID: \"51d0329d-de65-4714-9a38-e9946fe58dcb\") " pod="kube-system/kube-proxy-gldhx" Dec 13 02:38:14.785263 kubelet[1609]: I1213 02:38:14.785254 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a73bc3d0-895c-498f-91ae-97b4e0a098c0-node-certs\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785320 kubelet[1609]: I1213 02:38:14.785312 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-var-lib-calico\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785384 kubelet[1609]: I1213 02:38:14.785376 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/51d0329d-de65-4714-9a38-e9946fe58dcb-kube-proxy\") pod \"kube-proxy-gldhx\" (UID: \"51d0329d-de65-4714-9a38-e9946fe58dcb\") " pod="kube-system/kube-proxy-gldhx" Dec 13 02:38:14.785438 kubelet[1609]: I1213 02:38:14.785428 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b94ced8d-aa0b-4b3d-b742-77b9282d98e3-socket-dir\") pod \"csi-node-driver-lwtlv\" (UID: \"b94ced8d-aa0b-4b3d-b742-77b9282d98e3\") " pod="calico-system/csi-node-driver-lwtlv" Dec 13 02:38:14.785500 kubelet[1609]: I1213 02:38:14.785492 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-lib-modules\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785559 kubelet[1609]: I1213 02:38:14.785550 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-var-run-calico\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785613 kubelet[1609]: I1213 02:38:14.785604 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-cni-net-dir\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785668 kubelet[1609]: I1213 02:38:14.785659 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b94ced8d-aa0b-4b3d-b742-77b9282d98e3-registration-dir\") pod \"csi-node-driver-lwtlv\" (UID: \"b94ced8d-aa0b-4b3d-b742-77b9282d98e3\") " pod="calico-system/csi-node-driver-lwtlv" Dec 13 02:38:14.785728 kubelet[1609]: I1213 02:38:14.785720 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dzf8s\" (UniqueName: \"kubernetes.io/projected/b94ced8d-aa0b-4b3d-b742-77b9282d98e3-kube-api-access-dzf8s\") pod \"csi-node-driver-lwtlv\" (UID: \"b94ced8d-aa0b-4b3d-b742-77b9282d98e3\") " pod="calico-system/csi-node-driver-lwtlv" Dec 13 02:38:14.785786 kubelet[1609]: I1213 02:38:14.785778 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-xtables-lock\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785844 kubelet[1609]: I1213 02:38:14.785836 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-flexvol-driver-host\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785895 kubelet[1609]: I1213 02:38:14.785886 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4xq82\" (UniqueName: \"kubernetes.io/projected/a73bc3d0-895c-498f-91ae-97b4e0a098c0-kube-api-access-4xq82\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.785956 kubelet[1609]: I1213 02:38:14.785941 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-cni-log-dir\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.786018 kubelet[1609]: I1213 02:38:14.786009 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b94ced8d-aa0b-4b3d-b742-77b9282d98e3-varrun\") pod \"csi-node-driver-lwtlv\" (UID: \"b94ced8d-aa0b-4b3d-b742-77b9282d98e3\") " pod="calico-system/csi-node-driver-lwtlv" Dec 13 02:38:14.786072 kubelet[1609]: I1213 02:38:14.786064 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b94ced8d-aa0b-4b3d-b742-77b9282d98e3-kubelet-dir\") pod \"csi-node-driver-lwtlv\" (UID: \"b94ced8d-aa0b-4b3d-b742-77b9282d98e3\") " pod="calico-system/csi-node-driver-lwtlv" Dec 13 02:38:14.786332 update_engine[1238]: I1213 02:38:14.786135 1238 update_attempter.cc:509] Updating boot flags... Dec 13 02:38:14.786554 kubelet[1609]: I1213 02:38:14.786544 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/51d0329d-de65-4714-9a38-e9946fe58dcb-lib-modules\") pod \"kube-proxy-gldhx\" (UID: \"51d0329d-de65-4714-9a38-e9946fe58dcb\") " pod="kube-system/kube-proxy-gldhx" Dec 13 02:38:14.786612 kubelet[1609]: I1213 02:38:14.786603 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k98hc\" (UniqueName: \"kubernetes.io/projected/51d0329d-de65-4714-9a38-e9946fe58dcb-kube-api-access-k98hc\") pod \"kube-proxy-gldhx\" (UID: \"51d0329d-de65-4714-9a38-e9946fe58dcb\") " pod="kube-system/kube-proxy-gldhx" Dec 13 02:38:14.786674 kubelet[1609]: I1213 02:38:14.786665 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-policysync\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.786732 kubelet[1609]: I1213 02:38:14.786724 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a73bc3d0-895c-498f-91ae-97b4e0a098c0-tigera-ca-bundle\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.786787 kubelet[1609]: I1213 02:38:14.786778 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a73bc3d0-895c-498f-91ae-97b4e0a098c0-cni-bin-dir\") pod \"calico-node-qp9cg\" (UID: \"a73bc3d0-895c-498f-91ae-97b4e0a098c0\") " pod="calico-system/calico-node-qp9cg" Dec 13 02:38:14.888240 kubelet[1609]: E1213 02:38:14.888151 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.888240 kubelet[1609]: W1213 02:38:14.888166 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.888240 kubelet[1609]: E1213 02:38:14.888184 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.888514 kubelet[1609]: E1213 02:38:14.888478 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.888514 kubelet[1609]: W1213 02:38:14.888484 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.888514 kubelet[1609]: E1213 02:38:14.888502 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.888860 kubelet[1609]: E1213 02:38:14.888838 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.888860 kubelet[1609]: W1213 02:38:14.888848 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.888860 kubelet[1609]: E1213 02:38:14.888858 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.889017 kubelet[1609]: E1213 02:38:14.889011 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.889017 kubelet[1609]: W1213 02:38:14.889016 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.889100 kubelet[1609]: E1213 02:38:14.889092 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.889211 kubelet[1609]: E1213 02:38:14.889194 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.889211 kubelet[1609]: W1213 02:38:14.889202 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.889286 kubelet[1609]: E1213 02:38:14.889277 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.889432 kubelet[1609]: E1213 02:38:14.889418 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.889432 kubelet[1609]: W1213 02:38:14.889424 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.889506 kubelet[1609]: E1213 02:38:14.889499 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.894300 kubelet[1609]: E1213 02:38:14.894076 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894300 kubelet[1609]: W1213 02:38:14.894091 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894300 kubelet[1609]: E1213 02:38:14.894190 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894300 kubelet[1609]: W1213 02:38:14.894194 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894300 kubelet[1609]: E1213 02:38:14.894267 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894300 kubelet[1609]: W1213 02:38:14.894270 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894548 kubelet[1609]: E1213 02:38:14.894335 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894548 kubelet[1609]: W1213 02:38:14.894339 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894548 kubelet[1609]: E1213 02:38:14.894448 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894548 kubelet[1609]: W1213 02:38:14.894452 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894548 kubelet[1609]: E1213 02:38:14.894515 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894548 kubelet[1609]: W1213 02:38:14.894519 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894548 kubelet[1609]: E1213 02:38:14.894527 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.894697 kubelet[1609]: E1213 02:38:14.894598 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894697 kubelet[1609]: W1213 02:38:14.894602 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894697 kubelet[1609]: E1213 02:38:14.894606 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.894771 kubelet[1609]: E1213 02:38:14.894715 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894771 kubelet[1609]: W1213 02:38:14.894719 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894771 kubelet[1609]: E1213 02:38:14.894724 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.894771 kubelet[1609]: E1213 02:38:14.894741 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.894848 kubelet[1609]: E1213 02:38:14.894809 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894848 kubelet[1609]: W1213 02:38:14.894813 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894848 kubelet[1609]: E1213 02:38:14.894818 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.894919 kubelet[1609]: E1213 02:38:14.894882 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894919 kubelet[1609]: W1213 02:38:14.894886 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894919 kubelet[1609]: E1213 02:38:14.894890 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.894996 kubelet[1609]: E1213 02:38:14.894966 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.894996 kubelet[1609]: W1213 02:38:14.894971 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.894996 kubelet[1609]: E1213 02:38:14.894975 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.895170 kubelet[1609]: E1213 02:38:14.895085 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.895799 kubelet[1609]: E1213 02:38:14.895253 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.895799 kubelet[1609]: E1213 02:38:14.895268 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.895799 kubelet[1609]: E1213 02:38:14.895768 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.895945 kubelet[1609]: E1213 02:38:14.895938 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.896015 kubelet[1609]: W1213 02:38:14.896005 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.896106 kubelet[1609]: E1213 02:38:14.896072 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.896304 kubelet[1609]: E1213 02:38:14.896295 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.896395 kubelet[1609]: W1213 02:38:14.896384 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.896464 kubelet[1609]: E1213 02:38:14.896454 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.896625 kubelet[1609]: E1213 02:38:14.896618 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.896693 kubelet[1609]: W1213 02:38:14.896685 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.896744 kubelet[1609]: E1213 02:38:14.896736 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.896893 kubelet[1609]: E1213 02:38:14.896887 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.896939 kubelet[1609]: W1213 02:38:14.896926 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.896988 kubelet[1609]: E1213 02:38:14.896981 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.897131 kubelet[1609]: E1213 02:38:14.897125 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.897184 kubelet[1609]: W1213 02:38:14.897176 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.897233 kubelet[1609]: E1213 02:38:14.897225 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.897398 kubelet[1609]: E1213 02:38:14.897381 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.897466 kubelet[1609]: W1213 02:38:14.897458 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.897518 kubelet[1609]: E1213 02:38:14.897511 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.910352 kubelet[1609]: E1213 02:38:14.910185 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.910352 kubelet[1609]: W1213 02:38:14.910196 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.910352 kubelet[1609]: E1213 02:38:14.910212 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.919759 kubelet[1609]: E1213 02:38:14.919736 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.919759 kubelet[1609]: W1213 02:38:14.919755 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.919871 kubelet[1609]: E1213 02:38:14.919777 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.919952 kubelet[1609]: E1213 02:38:14.919932 1609 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:38:14.919952 kubelet[1609]: W1213 02:38:14.919940 1609 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:38:14.919952 kubelet[1609]: E1213 02:38:14.919946 1609 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:38:14.999447 env[1244]: time="2024-12-13T02:38:14.996620542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qp9cg,Uid:a73bc3d0-895c-498f-91ae-97b4e0a098c0,Namespace:calico-system,Attempt:0,}" Dec 13 02:38:15.000892 env[1244]: time="2024-12-13T02:38:15.000844335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gldhx,Uid:51d0329d-de65-4714-9a38-e9946fe58dcb,Namespace:kube-system,Attempt:0,}" Dec 13 02:38:15.676436 kubelet[1609]: E1213 02:38:15.676401 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:15.776272 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3824315597.mount: Deactivated successfully. Dec 13 02:38:15.810898 env[1244]: time="2024-12-13T02:38:15.810851263Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.828073 env[1244]: time="2024-12-13T02:38:15.828033543Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.844860 env[1244]: time="2024-12-13T02:38:15.844830076Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.853679 env[1244]: time="2024-12-13T02:38:15.853647372Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.855876 env[1244]: time="2024-12-13T02:38:15.855844525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.856783 env[1244]: time="2024-12-13T02:38:15.856760512Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.857688 env[1244]: time="2024-12-13T02:38:15.857660975Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.858676 env[1244]: time="2024-12-13T02:38:15.858657590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:15.873193 env[1244]: time="2024-12-13T02:38:15.868956785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:38:15.873193 env[1244]: time="2024-12-13T02:38:15.868975083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:38:15.873193 env[1244]: time="2024-12-13T02:38:15.868981752Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:38:15.873193 env[1244]: time="2024-12-13T02:38:15.869097268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96c5c47481ee9f1a37b66c723cbc693639be47f15a4f016db824c7e98400cc58 pid=1715 runtime=io.containerd.runc.v2 Dec 13 02:38:15.873824 env[1244]: time="2024-12-13T02:38:15.868412208Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:38:15.873824 env[1244]: time="2024-12-13T02:38:15.868436331Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:38:15.873824 env[1244]: time="2024-12-13T02:38:15.868455004Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:38:15.873824 env[1244]: time="2024-12-13T02:38:15.868533985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852 pid=1716 runtime=io.containerd.runc.v2 Dec 13 02:38:15.887074 systemd[1]: Started cri-containerd-d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852.scope. Dec 13 02:38:15.912942 kernel: kauditd_printk_skb: 242 callbacks suppressed Dec 13 02:38:15.913013 kernel: audit: type=1400 audit(1734057495.902:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.913045 kernel: audit: type=1400 audit(1734057495.902:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.913071 kernel: audit: type=1400 audit(1734057495.902:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918722 kernel: audit: type=1400 audit(1734057495.902:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918805 kernel: audit: type=1400 audit(1734057495.902:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.920211 systemd[1]: Started cri-containerd-96c5c47481ee9f1a37b66c723cbc693639be47f15a4f016db824c7e98400cc58.scope. Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.925748 kernel: audit: type=1400 audit(1734057495.902:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.925812 kernel: audit: type=1400 audit(1734057495.902:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.930423 kernel: audit: type=1400 audit(1734057495.902:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.936887 kernel: audit: type=1400 audit(1734057495.902:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.936957 kernel: audit: type=1400 audit(1734057495.908:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.908000 audit: BPF prog-id=58 op=LOAD Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1716 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832303231373632356233383338653465306637323961656537 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1716 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832303231373632356233383338653465306637323961656537 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit: BPF prog-id=59 op=LOAD Dec 13 02:38:15.918000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000308350 items=0 ppid=1716 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832303231373632356233383338653465306637323961656537 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit: BPF prog-id=60 op=LOAD Dec 13 02:38:15.918000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308398 items=0 ppid=1716 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832303231373632356233383338653465306637323961656537 Dec 13 02:38:15.918000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:38:15.918000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { perfmon } for pid=1738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit[1738]: AVC avc: denied { bpf } for pid=1738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.918000 audit: BPF prog-id=61 op=LOAD Dec 13 02:38:15.918000 audit[1738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003087a8 items=0 ppid=1716 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633832303231373632356233383338653465306637323961656537 Dec 13 02:38:15.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit: BPF prog-id=62 op=LOAD Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1715 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563343734383165653966316133376236366337323363626336 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1715 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563343734383165653966316133376236366337323363626336 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit: BPF prog-id=63 op=LOAD Dec 13 02:38:15.938000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c2eb0 items=0 ppid=1715 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563343734383165653966316133376236366337323363626336 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit: BPF prog-id=64 op=LOAD Dec 13 02:38:15.938000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c2ef8 items=0 ppid=1715 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563343734383165653966316133376236366337323363626336 Dec 13 02:38:15.938000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:38:15.938000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:15.938000 audit: BPF prog-id=65 op=LOAD Dec 13 02:38:15.938000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c3308 items=0 ppid=1715 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563343734383165653966316133376236366337323363626336 Dec 13 02:38:15.947350 env[1244]: time="2024-12-13T02:38:15.947316984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qp9cg,Uid:a73bc3d0-895c-498f-91ae-97b4e0a098c0,Namespace:calico-system,Attempt:0,} returns sandbox id \"d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852\"" Dec 13 02:38:15.948884 env[1244]: time="2024-12-13T02:38:15.948838714Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:38:15.951944 env[1244]: time="2024-12-13T02:38:15.951918040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gldhx,Uid:51d0329d-de65-4714-9a38-e9946fe58dcb,Namespace:kube-system,Attempt:0,} returns sandbox id \"96c5c47481ee9f1a37b66c723cbc693639be47f15a4f016db824c7e98400cc58\"" Dec 13 02:38:16.131195 kubelet[1609]: E1213 02:38:16.131106 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwtlv" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" Dec 13 02:38:16.677829 kubelet[1609]: E1213 02:38:16.677771 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:17.299342 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2879681939.mount: Deactivated successfully. Dec 13 02:38:17.432810 env[1244]: time="2024-12-13T02:38:17.432773907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:17.440163 env[1244]: time="2024-12-13T02:38:17.440129531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:17.446091 env[1244]: time="2024-12-13T02:38:17.446061737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:17.450036 env[1244]: time="2024-12-13T02:38:17.450014993Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:17.450193 env[1244]: time="2024-12-13T02:38:17.450175343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:38:17.451609 env[1244]: time="2024-12-13T02:38:17.451154092Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:38:17.451734 env[1244]: time="2024-12-13T02:38:17.451715003Z" level=info msg="CreateContainer within sandbox \"d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:38:17.462712 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount898875935.mount: Deactivated successfully. Dec 13 02:38:17.466229 env[1244]: time="2024-12-13T02:38:17.466196617Z" level=info msg="CreateContainer within sandbox \"d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c\"" Dec 13 02:38:17.466775 env[1244]: time="2024-12-13T02:38:17.466752613Z" level=info msg="StartContainer for \"96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c\"" Dec 13 02:38:17.482598 systemd[1]: Started cri-containerd-96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c.scope. Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa973322c68 items=0 ppid=1716 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:17.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343539313530623939636432633535326637663966393066346630 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit: BPF prog-id=66 op=LOAD Dec 13 02:38:17.493000 audit[1792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a4c28 items=0 ppid=1716 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:17.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343539313530623939636432633535326637663966393066346630 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.493000 audit: BPF prog-id=67 op=LOAD Dec 13 02:38:17.493000 audit[1792]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a4c78 items=0 ppid=1716 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:17.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343539313530623939636432633535326637663966393066346630 Dec 13 02:38:17.494000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:38:17.494000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { perfmon } for pid=1792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit[1792]: AVC avc: denied { bpf } for pid=1792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:17.494000 audit: BPF prog-id=68 op=LOAD Dec 13 02:38:17.494000 audit[1792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a4d08 items=0 ppid=1716 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:17.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343539313530623939636432633535326637663966393066346630 Dec 13 02:38:17.509190 env[1244]: time="2024-12-13T02:38:17.509157417Z" level=info msg="StartContainer for \"96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c\" returns successfully" Dec 13 02:38:17.514166 systemd[1]: cri-containerd-96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c.scope: Deactivated successfully. Dec 13 02:38:17.517000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:38:17.678842 kubelet[1609]: E1213 02:38:17.678804 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:17.684526 env[1244]: time="2024-12-13T02:38:17.684494043Z" level=info msg="shim disconnected" id=96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c Dec 13 02:38:17.684526 env[1244]: time="2024-12-13T02:38:17.684521760Z" level=warning msg="cleaning up after shim disconnected" id=96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c namespace=k8s.io Dec 13 02:38:17.684526 env[1244]: time="2024-12-13T02:38:17.684528684Z" level=info msg="cleaning up dead shim" Dec 13 02:38:17.689298 env[1244]: time="2024-12-13T02:38:17.689175477Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:38:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1832 runtime=io.containerd.runc.v2\n" Dec 13 02:38:18.131589 kubelet[1609]: E1213 02:38:18.131182 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwtlv" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" Dec 13 02:38:18.266356 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-96459150b99cd2c552f7f9f90f4f007626217b44501107378eaefba04f52be0c-rootfs.mount: Deactivated successfully. Dec 13 02:38:18.574464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3125340869.mount: Deactivated successfully. Dec 13 02:38:18.679734 kubelet[1609]: E1213 02:38:18.679694 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:19.020248 env[1244]: time="2024-12-13T02:38:19.020213542Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:19.020924 env[1244]: time="2024-12-13T02:38:19.020902152Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:19.022325 env[1244]: time="2024-12-13T02:38:19.022312257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:19.025369 env[1244]: time="2024-12-13T02:38:19.025344205Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:19.025497 env[1244]: time="2024-12-13T02:38:19.025480151Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:38:19.026388 env[1244]: time="2024-12-13T02:38:19.026372546Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:38:19.027033 env[1244]: time="2024-12-13T02:38:19.027017594Z" level=info msg="CreateContainer within sandbox \"96c5c47481ee9f1a37b66c723cbc693639be47f15a4f016db824c7e98400cc58\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:38:19.033205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3196923498.mount: Deactivated successfully. Dec 13 02:38:19.042664 env[1244]: time="2024-12-13T02:38:19.042638724Z" level=info msg="CreateContainer within sandbox \"96c5c47481ee9f1a37b66c723cbc693639be47f15a4f016db824c7e98400cc58\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"146b5f3cfe33e8525a2aff6f067f06f1382280bc2b7575bdbbae7b9e6a90455c\"" Dec 13 02:38:19.043111 env[1244]: time="2024-12-13T02:38:19.043095457Z" level=info msg="StartContainer for \"146b5f3cfe33e8525a2aff6f067f06f1382280bc2b7575bdbbae7b9e6a90455c\"" Dec 13 02:38:19.055125 systemd[1]: Started cri-containerd-146b5f3cfe33e8525a2aff6f067f06f1382280bc2b7575bdbbae7b9e6a90455c.scope. Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f71c43a7988 items=0 ppid=1715 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134366235663363666533336538353235613261666636663036376630 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit: BPF prog-id=69 op=LOAD Dec 13 02:38:19.064000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e1ba8 items=0 ppid=1715 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134366235663363666533336538353235613261666636663036376630 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit: BPF prog-id=70 op=LOAD Dec 13 02:38:19.064000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e1bf8 items=0 ppid=1715 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134366235663363666533336538353235613261666636663036376630 Dec 13 02:38:19.064000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:38:19.064000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:19.064000 audit: BPF prog-id=71 op=LOAD Dec 13 02:38:19.064000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e1c88 items=0 ppid=1715 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134366235663363666533336538353235613261666636663036376630 Dec 13 02:38:19.080154 env[1244]: time="2024-12-13T02:38:19.080129294Z" level=info msg="StartContainer for \"146b5f3cfe33e8525a2aff6f067f06f1382280bc2b7575bdbbae7b9e6a90455c\" returns successfully" Dec 13 02:38:19.113000 audit[1907]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.113000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe30aafe80 a2=0 a3=7ffe30aafe6c items=0 ppid=1867 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:38:19.113000 audit[1909]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.113000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9f324f90 a2=0 a3=7ffd9f324f7c items=0 ppid=1867 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:38:19.114000 audit[1908]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.114000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc287559b0 a2=0 a3=7ffc2875599c items=0 ppid=1867 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:38:19.114000 audit[1910]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.114000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd078d86a0 a2=0 a3=7ffd078d868c items=0 ppid=1867 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:38:19.115000 audit[1911]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.115000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe85206ae0 a2=0 a3=7ffe85206acc items=0 ppid=1867 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:38:19.115000 audit[1912]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.115000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc30ec30e0 a2=0 a3=7ffc30ec30cc items=0 ppid=1867 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:38:19.221000 audit[1913]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.221000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff8398ca50 a2=0 a3=7fff8398ca3c items=0 ppid=1867 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:38:19.223000 audit[1915]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.223000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffada85960 a2=0 a3=7fffada8594c items=0 ppid=1867 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:38:19.225000 audit[1918]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.225000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff294c2780 a2=0 a3=7fff294c276c items=0 ppid=1867 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:38:19.226000 audit[1919]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.226000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdfb330f0 a2=0 a3=7ffcdfb330dc items=0 ppid=1867 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:38:19.228000 audit[1921]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.228000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee3b25580 a2=0 a3=7ffee3b2556c items=0 ppid=1867 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:38:19.229000 audit[1922]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.229000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd0535c40 a2=0 a3=7ffdd0535c2c items=0 ppid=1867 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:38:19.230000 audit[1924]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.230000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd68211b80 a2=0 a3=7ffd68211b6c items=0 ppid=1867 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:38:19.232000 audit[1927]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.232000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc367571c0 a2=0 a3=7ffc367571ac items=0 ppid=1867 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:38:19.233000 audit[1928]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.233000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5c8b81d0 a2=0 a3=7ffd5c8b81bc items=0 ppid=1867 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:38:19.235000 audit[1930]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.235000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb4d8fd90 a2=0 a3=7fffb4d8fd7c items=0 ppid=1867 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:38:19.236000 audit[1931]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.236000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe72ed2070 a2=0 a3=7ffe72ed205c items=0 ppid=1867 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:38:19.238000 audit[1933]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.238000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdee928940 a2=0 a3=7ffdee92892c items=0 ppid=1867 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:38:19.240000 audit[1936]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.240000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc208fca0 a2=0 a3=7fffc208fc8c items=0 ppid=1867 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:38:19.242000 audit[1939]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.242000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc039c6b0 a2=0 a3=7ffcc039c69c items=0 ppid=1867 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:38:19.243000 audit[1940]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.243000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde1925980 a2=0 a3=7ffde192596c items=0 ppid=1867 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:38:19.244000 audit[1942]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.244000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5c8ebbc0 a2=0 a3=7ffc5c8ebbac items=0 ppid=1867 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:38:19.280000 audit[1947]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.280000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff9f209650 a2=0 a3=7fff9f20963c items=0 ppid=1867 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:38:19.281000 audit[1948]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.281000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3a9d23d0 a2=0 a3=7ffe3a9d23bc items=0 ppid=1867 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:38:19.283000 audit[1950]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:38:19.283000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdce9ef6d0 a2=0 a3=7ffdce9ef6bc items=0 ppid=1867 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:38:19.291000 audit[1956]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:19.291000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffe544fb80 a2=0 a3=7fffe544fb6c items=0 ppid=1867 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:19.307000 audit[1956]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:19.307000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fffe544fb80 a2=0 a3=7fffe544fb6c items=0 ppid=1867 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:19.315000 audit[1964]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.315000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe9807e820 a2=0 a3=7ffe9807e80c items=0 ppid=1867 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:38:19.316000 audit[1966]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.316000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd417f8cb0 a2=0 a3=7ffd417f8c9c items=0 ppid=1867 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:38:19.319000 audit[1969]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.319000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcb815580 a2=0 a3=7fffcb81556c items=0 ppid=1867 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:38:19.320000 audit[1970]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.320000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff563f4110 a2=0 a3=7fff563f40fc items=0 ppid=1867 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:38:19.321000 audit[1972]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.321000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe53949d0 a2=0 a3=7fffe53949bc items=0 ppid=1867 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:38:19.322000 audit[1973]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.322000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff65b09620 a2=0 a3=7fff65b0960c items=0 ppid=1867 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:38:19.324000 audit[1975]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.324000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff8097860 a2=0 a3=7ffff809784c items=0 ppid=1867 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:38:19.326000 audit[1978]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.326000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd747963a0 a2=0 a3=7ffd7479638c items=0 ppid=1867 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:38:19.327000 audit[1979]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.327000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe91dd880 a2=0 a3=7fffe91dd86c items=0 ppid=1867 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:38:19.328000 audit[1981]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.328000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe75cabdb0 a2=0 a3=7ffe75cabd9c items=0 ppid=1867 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:38:19.329000 audit[1982]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.329000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc59d61bc0 a2=0 a3=7ffc59d61bac items=0 ppid=1867 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:38:19.331000 audit[1984]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.331000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc044a4360 a2=0 a3=7ffc044a434c items=0 ppid=1867 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:38:19.333000 audit[1987]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.333000 audit[1987]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecd0c04c0 a2=0 a3=7ffecd0c04ac items=0 ppid=1867 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:38:19.335000 audit[1990]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.335000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4a843a10 a2=0 a3=7fff4a8439fc items=0 ppid=1867 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:38:19.336000 audit[1991]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.336000 audit[1991]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee43a8e10 a2=0 a3=7ffee43a8dfc items=0 ppid=1867 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:38:19.338000 audit[1993]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.338000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc9266b1f0 a2=0 a3=7ffc9266b1dc items=0 ppid=1867 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:38:19.340000 audit[1996]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.340000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe45455740 a2=0 a3=7ffe4545572c items=0 ppid=1867 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:38:19.341000 audit[1997]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.341000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8ab28e60 a2=0 a3=7ffe8ab28e4c items=0 ppid=1867 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:38:19.342000 audit[1999]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.342000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdafc054f0 a2=0 a3=7ffdafc054dc items=0 ppid=1867 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:38:19.343000 audit[2000]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.343000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff016908f0 a2=0 a3=7fff016908dc items=0 ppid=1867 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:38:19.344000 audit[2002]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.344000 audit[2002]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc72e8c660 a2=0 a3=7ffc72e8c64c items=0 ppid=1867 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:38:19.346000 audit[2005]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:38:19.346000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdaff7a7c0 a2=0 a3=7ffdaff7a7ac items=0 ppid=1867 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:38:19.348000 audit[2007]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:38:19.348000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc53b4af70 a2=0 a3=7ffc53b4af5c items=0 ppid=1867 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.348000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:19.348000 audit[2007]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:38:19.348000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc53b4af70 a2=0 a3=7ffc53b4af5c items=0 ppid=1867 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:19.348000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:19.680452 kubelet[1609]: E1213 02:38:19.680405 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:20.131209 kubelet[1609]: E1213 02:38:20.131004 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwtlv" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" Dec 13 02:38:20.681139 kubelet[1609]: E1213 02:38:20.681096 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:21.681737 kubelet[1609]: E1213 02:38:21.681711 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:22.131769 kubelet[1609]: E1213 02:38:22.131633 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lwtlv" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" Dec 13 02:38:22.475303 env[1244]: time="2024-12-13T02:38:22.475258149Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:22.485787 env[1244]: time="2024-12-13T02:38:22.485756249Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:22.493816 env[1244]: time="2024-12-13T02:38:22.493789632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:22.496271 env[1244]: time="2024-12-13T02:38:22.496249807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:22.496740 env[1244]: time="2024-12-13T02:38:22.496714724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:38:22.498946 env[1244]: time="2024-12-13T02:38:22.498898076Z" level=info msg="CreateContainer within sandbox \"d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:38:22.541526 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount201317596.mount: Deactivated successfully. Dec 13 02:38:22.584195 env[1244]: time="2024-12-13T02:38:22.584152332Z" level=info msg="CreateContainer within sandbox \"d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6\"" Dec 13 02:38:22.584604 env[1244]: time="2024-12-13T02:38:22.584585320Z" level=info msg="StartContainer for \"42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6\"" Dec 13 02:38:22.603821 systemd[1]: Started cri-containerd-42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6.scope. Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.615806 kernel: kauditd_printk_skb: 344 callbacks suppressed Dec 13 02:38:22.615845 kernel: audit: type=1400 audit(1734057502.613:522): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe804b07968 items=0 ppid=1716 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:22.622071 kernel: audit: type=1300 audit(1734057502.613:522): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe804b07968 items=0 ppid=1716 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:22.622133 kernel: audit: type=1327 audit(1734057502.613:522): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633865396235346133343135623734393162663738323632316437 Dec 13 02:38:22.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633865396235346133343135623734393162663738323632316437 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.628123 kernel: audit: type=1400 audit(1734057502.613:523): avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.631806 kernel: audit: type=1400 audit(1734057502.613:523): avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.631843 kernel: audit: type=1400 audit(1734057502.613:523): avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.637997 kernel: audit: type=1400 audit(1734057502.613:523): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.638051 kernel: audit: type=1400 audit(1734057502.613:523): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.641481 kernel: audit: type=1400 audit(1734057502.613:523): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.644586 kernel: audit: type=1400 audit(1734057502.613:523): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.613000 audit: BPF prog-id=72 op=LOAD Dec 13 02:38:22.613000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027e168 items=0 ppid=1716 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:22.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633865396235346133343135623734393162663738323632316437 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit: BPF prog-id=73 op=LOAD Dec 13 02:38:22.617000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027e1b8 items=0 ppid=1716 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:22.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633865396235346133343135623734393162663738323632316437 Dec 13 02:38:22.617000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:38:22.617000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:22.617000 audit: BPF prog-id=74 op=LOAD Dec 13 02:38:22.617000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027e248 items=0 ppid=1716 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:22.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633865396235346133343135623734393162663738323632316437 Dec 13 02:38:22.647445 env[1244]: time="2024-12-13T02:38:22.647424371Z" level=info msg="StartContainer for \"42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6\" returns successfully" Dec 13 02:38:22.682850 kubelet[1609]: E1213 02:38:22.682813 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:23.159232 kubelet[1609]: I1213 02:38:23.159198 1609 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-gldhx" podStartSLOduration=7.085958781 podStartE2EDuration="10.159185823s" podCreationTimestamp="2024-12-13 02:38:13 +0000 UTC" firstStartedPulling="2024-12-13 02:38:15.952761271 +0000 UTC m=+3.837999024" lastFinishedPulling="2024-12-13 02:38:19.025988309 +0000 UTC m=+6.911226066" observedRunningTime="2024-12-13 02:38:19.151420833 +0000 UTC m=+7.036658594" watchObservedRunningTime="2024-12-13 02:38:23.159185823 +0000 UTC m=+11.044423581" Dec 13 02:38:23.282843 env[1244]: time="2024-12-13T02:38:23.282800212Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:38:23.284017 systemd[1]: cri-containerd-42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6.scope: Deactivated successfully. Dec 13 02:38:23.287000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:38:23.339730 kubelet[1609]: I1213 02:38:23.339707 1609 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:38:23.463061 env[1244]: time="2024-12-13T02:38:23.462752669Z" level=info msg="shim disconnected" id=42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6 Dec 13 02:38:23.463061 env[1244]: time="2024-12-13T02:38:23.462787810Z" level=warning msg="cleaning up after shim disconnected" id=42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6 namespace=k8s.io Dec 13 02:38:23.463061 env[1244]: time="2024-12-13T02:38:23.462795992Z" level=info msg="cleaning up dead shim" Dec 13 02:38:23.469720 env[1244]: time="2024-12-13T02:38:23.469694966Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:38:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2056 runtime=io.containerd.runc.v2\n" Dec 13 02:38:23.539370 systemd[1]: run-containerd-runc-k8s.io-42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6-runc.O43q0O.mount: Deactivated successfully. Dec 13 02:38:23.539424 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-42c8e9b54a3415b7491bf782621d7f1e3e931c2e177c4ed7e4a91b55805dc8d6-rootfs.mount: Deactivated successfully. Dec 13 02:38:23.683433 kubelet[1609]: E1213 02:38:23.683397 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:24.134452 systemd[1]: Created slice kubepods-besteffort-podb94ced8d_aa0b_4b3d_b742_77b9282d98e3.slice. Dec 13 02:38:24.135844 env[1244]: time="2024-12-13T02:38:24.135823876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwtlv,Uid:b94ced8d-aa0b-4b3d-b742-77b9282d98e3,Namespace:calico-system,Attempt:0,}" Dec 13 02:38:24.154029 env[1244]: time="2024-12-13T02:38:24.154002820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:38:24.255806 env[1244]: time="2024-12-13T02:38:24.255755634Z" level=error msg="Failed to destroy network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:24.256740 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15-shm.mount: Deactivated successfully. Dec 13 02:38:24.257412 env[1244]: time="2024-12-13T02:38:24.257388703Z" level=error msg="encountered an error cleaning up failed sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:24.257455 env[1244]: time="2024-12-13T02:38:24.257425588Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwtlv,Uid:b94ced8d-aa0b-4b3d-b742-77b9282d98e3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:24.257618 kubelet[1609]: E1213 02:38:24.257575 1609 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:24.257657 kubelet[1609]: E1213 02:38:24.257639 1609 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lwtlv" Dec 13 02:38:24.257681 kubelet[1609]: E1213 02:38:24.257656 1609 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lwtlv" Dec 13 02:38:24.257722 kubelet[1609]: E1213 02:38:24.257700 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lwtlv_calico-system(b94ced8d-aa0b-4b3d-b742-77b9282d98e3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lwtlv_calico-system(b94ced8d-aa0b-4b3d-b742-77b9282d98e3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lwtlv" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" Dec 13 02:38:24.683930 kubelet[1609]: E1213 02:38:24.683895 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:25.155427 kubelet[1609]: I1213 02:38:25.155411 1609 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:38:25.155870 env[1244]: time="2024-12-13T02:38:25.155852966Z" level=info msg="StopPodSandbox for \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\"" Dec 13 02:38:25.172597 env[1244]: time="2024-12-13T02:38:25.172563796Z" level=error msg="StopPodSandbox for \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\" failed" error="failed to destroy network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:25.172858 kubelet[1609]: E1213 02:38:25.172823 1609 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:38:25.172906 kubelet[1609]: E1213 02:38:25.172870 1609 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15"} Dec 13 02:38:25.172930 kubelet[1609]: E1213 02:38:25.172916 1609 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b94ced8d-aa0b-4b3d-b742-77b9282d98e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:38:25.172978 kubelet[1609]: E1213 02:38:25.172931 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b94ced8d-aa0b-4b3d-b742-77b9282d98e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lwtlv" podUID="b94ced8d-aa0b-4b3d-b742-77b9282d98e3" Dec 13 02:38:25.684389 kubelet[1609]: E1213 02:38:25.684362 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:26.684759 kubelet[1609]: E1213 02:38:26.684730 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:26.808650 kubelet[1609]: I1213 02:38:26.808614 1609 topology_manager.go:215] "Topology Admit Handler" podUID="a985a89a-84f4-4c1d-b2e8-5b6cf6f27326" podNamespace="default" podName="nginx-deployment-85f456d6dd-h7p67" Dec 13 02:38:26.812452 systemd[1]: Created slice kubepods-besteffort-poda985a89a_84f4_4c1d_b2e8_5b6cf6f27326.slice. Dec 13 02:38:26.848354 kubelet[1609]: I1213 02:38:26.848326 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7vxpt\" (UniqueName: \"kubernetes.io/projected/a985a89a-84f4-4c1d-b2e8-5b6cf6f27326-kube-api-access-7vxpt\") pod \"nginx-deployment-85f456d6dd-h7p67\" (UID: \"a985a89a-84f4-4c1d-b2e8-5b6cf6f27326\") " pod="default/nginx-deployment-85f456d6dd-h7p67" Dec 13 02:38:27.116499 env[1244]: time="2024-12-13T02:38:27.116111609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h7p67,Uid:a985a89a-84f4-4c1d-b2e8-5b6cf6f27326,Namespace:default,Attempt:0,}" Dec 13 02:38:27.415272 env[1244]: time="2024-12-13T02:38:27.415236490Z" level=error msg="Failed to destroy network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:27.416447 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50-shm.mount: Deactivated successfully. Dec 13 02:38:27.416676 env[1244]: time="2024-12-13T02:38:27.416657726Z" level=error msg="encountered an error cleaning up failed sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:27.416751 env[1244]: time="2024-12-13T02:38:27.416734217Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h7p67,Uid:a985a89a-84f4-4c1d-b2e8-5b6cf6f27326,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:27.417189 kubelet[1609]: E1213 02:38:27.416949 1609 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:27.417189 kubelet[1609]: E1213 02:38:27.416997 1609 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-h7p67" Dec 13 02:38:27.417189 kubelet[1609]: E1213 02:38:27.417010 1609 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-h7p67" Dec 13 02:38:27.417274 kubelet[1609]: E1213 02:38:27.417045 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-h7p67_default(a985a89a-84f4-4c1d-b2e8-5b6cf6f27326)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-h7p67_default(a985a89a-84f4-4c1d-b2e8-5b6cf6f27326)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-h7p67" podUID="a985a89a-84f4-4c1d-b2e8-5b6cf6f27326" Dec 13 02:38:27.685582 kubelet[1609]: E1213 02:38:27.685299 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:28.158397 kubelet[1609]: I1213 02:38:28.158378 1609 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:38:28.158760 env[1244]: time="2024-12-13T02:38:28.158734749Z" level=info msg="StopPodSandbox for \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\"" Dec 13 02:38:28.194894 env[1244]: time="2024-12-13T02:38:28.194852229Z" level=error msg="StopPodSandbox for \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\" failed" error="failed to destroy network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:38:28.195166 kubelet[1609]: E1213 02:38:28.195136 1609 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:38:28.195225 kubelet[1609]: E1213 02:38:28.195168 1609 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50"} Dec 13 02:38:28.195225 kubelet[1609]: E1213 02:38:28.195191 1609 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a985a89a-84f4-4c1d-b2e8-5b6cf6f27326\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:38:28.195225 kubelet[1609]: E1213 02:38:28.195207 1609 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a985a89a-84f4-4c1d-b2e8-5b6cf6f27326\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-h7p67" podUID="a985a89a-84f4-4c1d-b2e8-5b6cf6f27326" Dec 13 02:38:28.685659 kubelet[1609]: E1213 02:38:28.685630 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:29.131094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2633988736.mount: Deactivated successfully. Dec 13 02:38:29.202662 env[1244]: time="2024-12-13T02:38:29.202615828Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:29.217082 env[1244]: time="2024-12-13T02:38:29.217053547Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:29.229140 env[1244]: time="2024-12-13T02:38:29.229114233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:29.236206 env[1244]: time="2024-12-13T02:38:29.236186204Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:29.236506 env[1244]: time="2024-12-13T02:38:29.236486975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:38:29.248902 env[1244]: time="2024-12-13T02:38:29.248874090Z" level=info msg="CreateContainer within sandbox \"d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:38:29.336631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3378572979.mount: Deactivated successfully. Dec 13 02:38:29.338871 env[1244]: time="2024-12-13T02:38:29.338840254Z" level=info msg="CreateContainer within sandbox \"d0c820217625b3838e4e0f729aee7c56626e43526d1229e7db27f8eed5e8e852\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799\"" Dec 13 02:38:29.339426 env[1244]: time="2024-12-13T02:38:29.339405837Z" level=info msg="StartContainer for \"bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799\"" Dec 13 02:38:29.350581 systemd[1]: Started cri-containerd-bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799.scope. Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.371758 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:38:29.371803 kernel: audit: type=1400 audit(1734057509.369:529): avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.377789 kernel: audit: type=1300 audit(1734057509.369:529): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f94107b8b98 items=0 ppid=1716 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:29.377819 kernel: audit: type=1327 audit(1734057509.369:529): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262393731363061363463316239616362376639306331323837393633 Dec 13 02:38:29.369000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f94107b8b98 items=0 ppid=1716 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:29.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262393731363061363463316239616362376639306331323837393633 Dec 13 02:38:29.381032 kernel: audit: type=1400 audit(1734057509.369:530): avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.385738 kernel: audit: type=1400 audit(1734057509.369:530): avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.388145 kernel: audit: type=1400 audit(1734057509.369:530): avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.390625 kernel: audit: type=1400 audit(1734057509.369:530): avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.393337 kernel: audit: type=1400 audit(1734057509.369:530): avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.398693 kernel: audit: type=1400 audit(1734057509.369:530): avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.398719 kernel: audit: type=1400 audit(1734057509.369:530): avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.369000 audit: BPF prog-id=75 op=LOAD Dec 13 02:38:29.369000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b99a8 items=0 ppid=1716 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:29.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262393731363061363463316239616362376639306331323837393633 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.376000 audit: BPF prog-id=76 op=LOAD Dec 13 02:38:29.376000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b99f8 items=0 ppid=1716 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:29.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262393731363061363463316239616362376639306331323837393633 Dec 13 02:38:29.384000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:38:29.384000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:29.384000 audit: BPF prog-id=77 op=LOAD Dec 13 02:38:29.384000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b9a88 items=0 ppid=1716 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:29.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262393731363061363463316239616362376639306331323837393633 Dec 13 02:38:29.412076 env[1244]: time="2024-12-13T02:38:29.412046158Z" level=info msg="StartContainer for \"bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799\" returns successfully" Dec 13 02:38:29.507672 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:38:29.507767 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:38:29.685755 kubelet[1609]: E1213 02:38:29.685725 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:30.186072 kubelet[1609]: I1213 02:38:30.186032 1609 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qp9cg" podStartSLOduration=3.8973336229999997 podStartE2EDuration="17.186016203s" podCreationTimestamp="2024-12-13 02:38:13 +0000 UTC" firstStartedPulling="2024-12-13 02:38:15.948522872 +0000 UTC m=+3.833760629" lastFinishedPulling="2024-12-13 02:38:29.237205449 +0000 UTC m=+17.122443209" observedRunningTime="2024-12-13 02:38:30.185117949 +0000 UTC m=+18.070355722" watchObservedRunningTime="2024-12-13 02:38:30.186016203 +0000 UTC m=+18.071253967" Dec 13 02:38:30.686709 kubelet[1609]: E1213 02:38:30.686686 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:30.703000 audit[2286]: AVC avc: denied { write } for pid=2286 comm="tee" name="fd" dev="proc" ino=30070 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:38:30.703000 audit[2286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5df8ea22 a2=241 a3=1b6 items=1 ppid=2251 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.703000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:38:30.703000 audit: PATH item=0 name="/dev/fd/63" inode=30061 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:38:30.703000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:38:30.708000 audit[2291]: AVC avc: denied { write } for pid=2291 comm="tee" name="fd" dev="proc" ino=30077 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:38:30.708000 audit[2291]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddda0ea22 a2=241 a3=1b6 items=1 ppid=2250 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.708000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:38:30.708000 audit: PATH item=0 name="/dev/fd/63" inode=30065 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:38:30.708000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:38:30.711000 audit[2300]: AVC avc: denied { write } for pid=2300 comm="tee" name="fd" dev="proc" ino=30990 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:38:30.712000 audit[2295]: AVC avc: denied { write } for pid=2295 comm="tee" name="fd" dev="proc" ino=30081 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:38:30.712000 audit[2295]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff12d71a23 a2=241 a3=1b6 items=1 ppid=2254 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.712000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:38:30.712000 audit: PATH item=0 name="/dev/fd/63" inode=30067 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:38:30.712000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:38:30.713000 audit[2305]: AVC avc: denied { write } for pid=2305 comm="tee" name="fd" dev="proc" ino=30085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:38:30.713000 audit[2305]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5745fa13 a2=241 a3=1b6 items=1 ppid=2255 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.713000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:38:30.713000 audit: PATH item=0 name="/dev/fd/63" inode=30074 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:38:30.713000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:38:30.721000 audit[2308]: AVC avc: denied { write } for pid=2308 comm="tee" name="fd" dev="proc" ino=30089 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:38:30.721000 audit[2308]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3d5bca24 a2=241 a3=1b6 items=1 ppid=2259 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.721000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:38:30.721000 audit: PATH item=0 name="/dev/fd/63" inode=30983 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:38:30.721000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:38:30.711000 audit[2300]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff89077a12 a2=241 a3=1b6 items=1 ppid=2258 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.711000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:38:30.711000 audit: PATH item=0 name="/dev/fd/63" inode=30980 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:38:30.711000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:38:30.726000 audit[2310]: AVC avc: denied { write } for pid=2310 comm="tee" name="fd" dev="proc" ino=30997 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:38:30.726000 audit[2310]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee0c68a22 a2=241 a3=1b6 items=1 ppid=2257 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.726000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:38:30.726000 audit: PATH item=0 name="/dev/fd/63" inode=30986 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:38:30.726000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:38:30.833715 systemd[1]: run-containerd-runc-k8s.io-bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799-runc.8hf3QI.mount: Deactivated successfully. Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit: BPF prog-id=78 op=LOAD Dec 13 02:38:30.841000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0f78b500 a2=98 a3=3 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.841000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.841000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit: BPF prog-id=79 op=LOAD Dec 13 02:38:30.841000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0f78b2e0 a2=74 a3=540051 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.841000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.841000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.841000 audit: BPF prog-id=80 op=LOAD Dec 13 02:38:30.841000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0f78b310 a2=94 a3=2 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.841000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.841000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit: BPF prog-id=81 op=LOAD Dec 13 02:38:30.947000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0f78b1d0 a2=40 a3=1 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.947000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:38:30.947000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.947000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0f78b2a0 a2=50 a3=7fff0f78b380 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.954000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.954000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f78b1e0 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.954000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.954000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.954000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f78b210 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.954000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.955000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.955000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f78b120 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.955000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.955000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f78b230 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.955000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.955000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f78b210 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.955000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.955000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f78b200 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.955000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.955000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f78b230 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.955000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.955000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f78b210 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.955000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.955000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f78b230 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0f78b200 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0f78b270 a2=28 a3=0 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0f78b020 a2=50 a3=1 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.956000 audit: BPF prog-id=82 op=LOAD Dec 13 02:38:30.956000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0f78b020 a2=94 a3=5 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.957000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0f78b0d0 a2=50 a3=1 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.957000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff0f78b1f0 a2=4 a3=38 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.957000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.957000 audit[2361]: AVC avc: denied { confidentiality } for pid=2361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:38:30.957000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0f78b240 a2=94 a3=6 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.957000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { confidentiality } for pid=2361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:38:30.958000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0f78a9f0 a2=94 a3=83 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.958000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.958000 audit[2361]: AVC avc: denied { confidentiality } for pid=2361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:38:30.958000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0f78a9f0 a2=94 a3=83 items=0 ppid=2267 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.958000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit: BPF prog-id=83 op=LOAD Dec 13 02:38:30.963000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc17de1110 a2=98 a3=1999999999999999 items=0 ppid=2267 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.963000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:38:30.963000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit: BPF prog-id=84 op=LOAD Dec 13 02:38:30.963000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc17de0ff0 a2=74 a3=ffff items=0 ppid=2267 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.963000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:38:30.963000 audit: BPF prog-id=84 op=UNLOAD Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:30.963000 audit: BPF prog-id=85 op=LOAD Dec 13 02:38:30.963000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc17de1030 a2=40 a3=7ffc17de1210 items=0 ppid=2267 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:30.963000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:38:30.963000 audit: BPF prog-id=85 op=UNLOAD Dec 13 02:38:31.037016 systemd-networkd[1060]: vxlan.calico: Link UP Dec 13 02:38:31.037022 systemd-networkd[1060]: vxlan.calico: Gained carrier Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.070000 audit: BPF prog-id=86 op=LOAD Dec 13 02:38:31.070000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc908d8bb0 a2=98 a3=ffffffff items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.070000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.071000 audit: BPF prog-id=86 op=UNLOAD Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.071000 audit: BPF prog-id=87 op=LOAD Dec 13 02:38:31.071000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc908d89c0 a2=74 a3=540051 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.071000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit: BPF prog-id=87 op=UNLOAD Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit: BPF prog-id=88 op=LOAD Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc908d89f0 a2=94 a3=2 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit: BPF prog-id=88 op=UNLOAD Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc908d88c0 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc908d88f0 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc908d8800 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc908d8910 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc908d88f0 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc908d88e0 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc908d8910 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc908d88f0 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc908d8910 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc908d88e0 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc908d8950 a2=28 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit: BPF prog-id=89 op=LOAD Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc908d87c0 a2=40 a3=0 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit: BPF prog-id=89 op=UNLOAD Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc908d87b0 a2=50 a3=2800 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc908d87b0 a2=50 a3=2800 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit: BPF prog-id=90 op=LOAD Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc908d7fd0 a2=94 a3=2 items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.073000 audit: BPF prog-id=90 op=UNLOAD Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.073000 audit: BPF prog-id=91 op=LOAD Dec 13 02:38:31.073000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc908d80d0 a2=94 a3=2d items=0 ppid=2267 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit: BPF prog-id=92 op=LOAD Dec 13 02:38:31.084000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0685bc90 a2=98 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.084000 audit: BPF prog-id=92 op=UNLOAD Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit: BPF prog-id=93 op=LOAD Dec 13 02:38:31.084000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0685ba70 a2=74 a3=540051 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.084000 audit: BPF prog-id=93 op=UNLOAD Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.084000 audit: BPF prog-id=94 op=LOAD Dec 13 02:38:31.084000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0685baa0 a2=94 a3=2 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.084000 audit: BPF prog-id=94 op=UNLOAD Dec 13 02:38:31.132474 systemd[1]: run-containerd-runc-k8s.io-bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799-runc.YC8e8S.mount: Deactivated successfully. Dec 13 02:38:31.179666 systemd[1]: run-containerd-runc-k8s.io-bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799-runc.eCXyfc.mount: Deactivated successfully. Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.195000 audit: BPF prog-id=95 op=LOAD Dec 13 02:38:31.195000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0685b960 a2=40 a3=1 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.195000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.197000 audit: BPF prog-id=95 op=UNLOAD Dec 13 02:38:31.197000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.197000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe0685ba30 a2=50 a3=7ffe0685bb10 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.197000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0685b970 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0685b9a0 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0685b8b0 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0685b9c0 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0685b9a0 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0685b990 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0685b9c0 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0685b9a0 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0685b9c0 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0685b990 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0685ba00 a2=28 a3=0 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe0685b7b0 a2=50 a3=1 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit: BPF prog-id=96 op=LOAD Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe0685b7b0 a2=94 a3=5 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.209000 audit: BPF prog-id=96 op=UNLOAD Dec 13 02:38:31.209000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.209000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe0685b860 a2=50 a3=1 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.209000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe0685b980 a2=4 a3=38 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { confidentiality } for pid=2438 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:38:31.210000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0685b9d0 a2=94 a3=6 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { confidentiality } for pid=2438 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:38:31.210000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0685b180 a2=94 a3=83 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { confidentiality } for pid=2438 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:38:31.210000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0685b180 a2=94 a3=83 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.210000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.210000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0685cbc0 a2=10 a3=f1f00800 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.211000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.211000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0685ca60 a2=10 a3=3 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.211000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.211000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.211000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0685ca00 a2=10 a3=3 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.211000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.211000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:31.211000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0685ca00 a2=10 a3=7 items=0 ppid=2267 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.211000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:38:31.220000 audit: BPF prog-id=91 op=UNLOAD Dec 13 02:38:31.274000 audit[2492]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:31.274000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd5d463e80 a2=0 a3=7ffd5d463e6c items=0 ppid=2267 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.274000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:31.281000 audit[2495]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:31.281000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd45abd7f0 a2=0 a3=7ffd45abd7dc items=0 ppid=2267 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.281000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:31.284000 audit[2494]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:31.284000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff64f64d50 a2=0 a3=7fff64f64d3c items=0 ppid=2267 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:31.286000 audit[2493]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:31.286000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffa9630180 a2=0 a3=7fffa963016c items=0 ppid=2267 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.286000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:31.686939 kubelet[1609]: E1213 02:38:31.686895 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:32.184462 systemd-networkd[1060]: vxlan.calico: Gained IPv6LL Dec 13 02:38:32.675938 kubelet[1609]: E1213 02:38:32.675906 1609 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:32.687516 kubelet[1609]: E1213 02:38:32.687470 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:33.687836 kubelet[1609]: E1213 02:38:33.687801 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:34.687949 kubelet[1609]: E1213 02:38:34.687922 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:35.688867 kubelet[1609]: E1213 02:38:35.688842 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:36.689727 kubelet[1609]: E1213 02:38:36.689693 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:37.690429 kubelet[1609]: E1213 02:38:37.690391 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:38.132596 env[1244]: time="2024-12-13T02:38:38.132290982Z" level=info msg="StopPodSandbox for \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\"" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.263 [INFO][2553] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.264 [INFO][2553] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" iface="eth0" netns="/var/run/netns/cni-77d606c1-9909-8ade-0eec-59d81a48a7c3" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.264 [INFO][2553] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" iface="eth0" netns="/var/run/netns/cni-77d606c1-9909-8ade-0eec-59d81a48a7c3" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.265 [INFO][2553] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" iface="eth0" netns="/var/run/netns/cni-77d606c1-9909-8ade-0eec-59d81a48a7c3" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.265 [INFO][2553] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.265 [INFO][2553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.484 [INFO][2559] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.484 [INFO][2559] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.484 [INFO][2559] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.489 [WARNING][2559] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.489 [INFO][2559] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.490 [INFO][2559] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:38:38.492739 env[1244]: 2024-12-13 02:38:38.491 [INFO][2553] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:38:38.495038 systemd[1]: run-netns-cni\x2d77d606c1\x2d9909\x2d8ade\x2d0eec\x2d59d81a48a7c3.mount: Deactivated successfully. Dec 13 02:38:38.495936 env[1244]: time="2024-12-13T02:38:38.495914385Z" level=info msg="TearDown network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\" successfully" Dec 13 02:38:38.495990 env[1244]: time="2024-12-13T02:38:38.495978463Z" level=info msg="StopPodSandbox for \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\" returns successfully" Dec 13 02:38:38.496532 env[1244]: time="2024-12-13T02:38:38.496507100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwtlv,Uid:b94ced8d-aa0b-4b3d-b742-77b9282d98e3,Namespace:calico-system,Attempt:1,}" Dec 13 02:38:38.649355 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:38:38.649430 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic2f4f999683: link becomes ready Dec 13 02:38:38.647545 systemd-networkd[1060]: calic2f4f999683: Link UP Dec 13 02:38:38.649724 systemd-networkd[1060]: calic2f4f999683: Gained carrier Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.551 [INFO][2566] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-csi--node--driver--lwtlv-eth0 csi-node-driver- calico-system b94ced8d-aa0b-4b3d-b742-77b9282d98e3 1085 0 2024-12-13 02:38:13 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.139 csi-node-driver-lwtlv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic2f4f999683 [] []}} ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.552 [INFO][2566] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.590 [INFO][2578] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" HandleID="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.598 [INFO][2578] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" HandleID="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.139", "pod":"csi-node-driver-lwtlv", "timestamp":"2024-12-13 02:38:38.590669603 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.598 [INFO][2578] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.598 [INFO][2578] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.598 [INFO][2578] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.599 [INFO][2578] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.615 [INFO][2578] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.619 [INFO][2578] ipam/ipam.go 489: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.620 [INFO][2578] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.621 [INFO][2578] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.621 [INFO][2578] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.621 [INFO][2578] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.625 [INFO][2578] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.632 [INFO][2578] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.1/26] block=192.168.110.0/26 handle="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.632 [INFO][2578] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.1/26] handle="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" host="10.67.124.139" Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.632 [INFO][2578] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:38:38.661748 env[1244]: 2024-12-13 02:38:38.632 [INFO][2578] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.1/26] IPv6=[] ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" HandleID="k8s-pod-network.8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.662411 env[1244]: 2024-12-13 02:38:38.633 [INFO][2566] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--lwtlv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b94ced8d-aa0b-4b3d-b742-77b9282d98e3", ResourceVersion:"1085", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"csi-node-driver-lwtlv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic2f4f999683", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:38:38.662411 env[1244]: 2024-12-13 02:38:38.633 [INFO][2566] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.1/32] ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.662411 env[1244]: 2024-12-13 02:38:38.633 [INFO][2566] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic2f4f999683 ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.662411 env[1244]: 2024-12-13 02:38:38.653 [INFO][2566] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.662411 env[1244]: 2024-12-13 02:38:38.653 [INFO][2566] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--lwtlv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b94ced8d-aa0b-4b3d-b742-77b9282d98e3", ResourceVersion:"1085", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e", Pod:"csi-node-driver-lwtlv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic2f4f999683", MAC:"e2:45:76:e2:6b:a2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:38:38.662411 env[1244]: 2024-12-13 02:38:38.659 [INFO][2566] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e" Namespace="calico-system" Pod="csi-node-driver-lwtlv" WorkloadEndpoint="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:38:38.665000 audit[2596]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:38.670113 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 02:38:38.670167 kernel: audit: type=1325 audit(1734057518.665:637): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:38.670192 kernel: audit: type=1300 audit(1734057518.665:637): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe0b7c5670 a2=0 a3=7ffe0b7c565c items=0 ppid=2267 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:38.665000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe0b7c5670 a2=0 a3=7ffe0b7c565c items=0 ppid=2267 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:38.665000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:38.673988 env[1244]: time="2024-12-13T02:38:38.673888782Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:38:38.674069 env[1244]: time="2024-12-13T02:38:38.674055034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:38:38.674138 env[1244]: time="2024-12-13T02:38:38.674125100Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:38:38.674290 env[1244]: time="2024-12-13T02:38:38.674270766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e pid=2609 runtime=io.containerd.runc.v2 Dec 13 02:38:38.676411 kernel: audit: type=1327 audit(1734057518.665:637): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:38.685561 systemd[1]: run-containerd-runc-k8s.io-8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e-runc.5HiDN2.mount: Deactivated successfully. Dec 13 02:38:38.687594 systemd[1]: Started cri-containerd-8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e.scope. Dec 13 02:38:38.691097 kubelet[1609]: E1213 02:38:38.691080 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.700123 kernel: audit: type=1400 audit(1734057518.693:638): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.700160 kernel: audit: type=1400 audit(1734057518.693:639): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.700176 kernel: audit: type=1400 audit(1734057518.693:640): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704943 kernel: audit: type=1400 audit(1734057518.693:641): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.710221 kernel: audit: type=1400 audit(1734057518.693:642): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.710331 kernel: audit: type=1400 audit(1734057518.693:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.713088 kernel: audit: type=1400 audit(1734057518.693:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.693000 audit: BPF prog-id=97 op=LOAD Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2609 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:38.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863373361383235313664343564666239623266346266386161363632 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2609 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:38.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863373361383235313664343564666239623266346266386161363632 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit: BPF prog-id=98 op=LOAD Dec 13 02:38:38.704000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000b0f70 items=0 ppid=2609 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:38.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863373361383235313664343564666239623266346266386161363632 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit: BPF prog-id=99 op=LOAD Dec 13 02:38:38.704000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000b0fb8 items=0 ppid=2609 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:38.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863373361383235313664343564666239623266346266386161363632 Dec 13 02:38:38.704000 audit: BPF prog-id=99 op=UNLOAD Dec 13 02:38:38.704000 audit: BPF prog-id=98 op=UNLOAD Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:38.704000 audit: BPF prog-id=100 op=LOAD Dec 13 02:38:38.704000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000b13c8 items=0 ppid=2609 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:38.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863373361383235313664343564666239623266346266386161363632 Dec 13 02:38:38.713055 systemd-resolved[1201]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:38:38.720713 env[1244]: time="2024-12-13T02:38:38.720690705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lwtlv,Uid:b94ced8d-aa0b-4b3d-b742-77b9282d98e3,Namespace:calico-system,Attempt:1,} returns sandbox id \"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e\"" Dec 13 02:38:38.721822 env[1244]: time="2024-12-13T02:38:38.721802852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:38:39.691342 kubelet[1609]: E1213 02:38:39.691295 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:40.131986 env[1244]: time="2024-12-13T02:38:40.131928317Z" level=info msg="StopPodSandbox for \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\"" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.186 [INFO][2657] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.186 [INFO][2657] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" iface="eth0" netns="/var/run/netns/cni-eeb4166a-a716-55bd-24f5-bc5eda78d7f7" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.186 [INFO][2657] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" iface="eth0" netns="/var/run/netns/cni-eeb4166a-a716-55bd-24f5-bc5eda78d7f7" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.187 [INFO][2657] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" iface="eth0" netns="/var/run/netns/cni-eeb4166a-a716-55bd-24f5-bc5eda78d7f7" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.187 [INFO][2657] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.187 [INFO][2657] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.206 [INFO][2663] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.206 [INFO][2663] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.206 [INFO][2663] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.210 [WARNING][2663] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.210 [INFO][2663] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.211 [INFO][2663] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:38:40.213179 env[1244]: 2024-12-13 02:38:40.212 [INFO][2657] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:38:40.215233 env[1244]: time="2024-12-13T02:38:40.214397998Z" level=info msg="TearDown network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\" successfully" Dec 13 02:38:40.215233 env[1244]: time="2024-12-13T02:38:40.214420345Z" level=info msg="StopPodSandbox for \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\" returns successfully" Dec 13 02:38:40.215233 env[1244]: time="2024-12-13T02:38:40.214742780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h7p67,Uid:a985a89a-84f4-4c1d-b2e8-5b6cf6f27326,Namespace:default,Attempt:1,}" Dec 13 02:38:40.214233 systemd[1]: run-netns-cni\x2deeb4166a\x2da716\x2d55bd\x2d24f5\x2dbc5eda78d7f7.mount: Deactivated successfully. Dec 13 02:38:40.264305 env[1244]: time="2024-12-13T02:38:40.264284488Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:40.265854 env[1244]: time="2024-12-13T02:38:40.265831471Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:40.266108 env[1244]: time="2024-12-13T02:38:40.266092639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:40.266704 env[1244]: time="2024-12-13T02:38:40.266686880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:40.266996 env[1244]: time="2024-12-13T02:38:40.266978823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:38:40.268468 env[1244]: time="2024-12-13T02:38:40.268448577Z" level=info msg="CreateContainer within sandbox \"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:38:40.277190 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2909143612.mount: Deactivated successfully. Dec 13 02:38:40.279922 env[1244]: time="2024-12-13T02:38:40.279891482Z" level=info msg="CreateContainer within sandbox \"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"00c173c547df11d2637fda8bcadeb3b708b1d6489938535269894c141478b914\"" Dec 13 02:38:40.280629 env[1244]: time="2024-12-13T02:38:40.280609361Z" level=info msg="StartContainer for \"00c173c547df11d2637fda8bcadeb3b708b1d6489938535269894c141478b914\"" Dec 13 02:38:40.303547 systemd[1]: Started cri-containerd-00c173c547df11d2637fda8bcadeb3b708b1d6489938535269894c141478b914.scope. Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7efc44672a88 items=0 ppid=2609 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633137336335343764663131643236333766646138626361646562 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.331000 audit: BPF prog-id=101 op=LOAD Dec 13 02:38:40.331000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c00022ccb8 items=0 ppid=2609 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633137336335343764663131643236333766646138626361646562 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit: BPF prog-id=102 op=LOAD Dec 13 02:38:40.332000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c00022cd08 items=0 ppid=2609 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633137336335343764663131643236333766646138626361646562 Dec 13 02:38:40.332000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:38:40.332000 audit: BPF prog-id=101 op=UNLOAD Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.332000 audit: BPF prog-id=103 op=LOAD Dec 13 02:38:40.332000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c00022cd98 items=0 ppid=2609 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633137336335343764663131643236333766646138626361646562 Dec 13 02:38:40.372941 env[1244]: time="2024-12-13T02:38:40.372461084Z" level=info msg="StartContainer for \"00c173c547df11d2637fda8bcadeb3b708b1d6489938535269894c141478b914\" returns successfully" Dec 13 02:38:40.373642 env[1244]: time="2024-12-13T02:38:40.373625498Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:38:40.376666 systemd-networkd[1060]: calic2f4f999683: Gained IPv6LL Dec 13 02:38:40.386714 systemd-networkd[1060]: cali87f9af8a7e9: Link UP Dec 13 02:38:40.390376 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:38:40.390519 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali87f9af8a7e9: link becomes ready Dec 13 02:38:40.390499 systemd-networkd[1060]: cali87f9af8a7e9: Gained carrier Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.298 [INFO][2669] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0 nginx-deployment-85f456d6dd- default a985a89a-84f4-4c1d-b2e8-5b6cf6f27326 1094 0 2024-12-13 02:38:26 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.139 nginx-deployment-85f456d6dd-h7p67 eth0 default [] [] [kns.default ksa.default.default] cali87f9af8a7e9 [] []}} ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.298 [INFO][2669] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.337 [INFO][2701] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" HandleID="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.346 [INFO][2701] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" HandleID="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334c80), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"nginx-deployment-85f456d6dd-h7p67", "timestamp":"2024-12-13 02:38:40.337071134 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.346 [INFO][2701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.346 [INFO][2701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.346 [INFO][2701] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.347 [INFO][2701] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.349 [INFO][2701] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.351 [INFO][2701] ipam/ipam.go 489: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.352 [INFO][2701] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.353 [INFO][2701] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.353 [INFO][2701] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.354 [INFO][2701] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.360 [INFO][2701] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.383 [INFO][2701] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.2/26] block=192.168.110.0/26 handle="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.383 [INFO][2701] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.2/26] handle="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" host="10.67.124.139" Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.383 [INFO][2701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:38:40.404530 env[1244]: 2024-12-13 02:38:40.383 [INFO][2701] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.2/26] IPv6=[] ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" HandleID="k8s-pod-network.bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.404994 env[1244]: 2024-12-13 02:38:40.384 [INFO][2669] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"a985a89a-84f4-4c1d-b2e8-5b6cf6f27326", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-h7p67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali87f9af8a7e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:38:40.404994 env[1244]: 2024-12-13 02:38:40.384 [INFO][2669] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.2/32] ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.404994 env[1244]: 2024-12-13 02:38:40.384 [INFO][2669] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali87f9af8a7e9 ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.404994 env[1244]: 2024-12-13 02:38:40.387 [INFO][2669] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.404994 env[1244]: 2024-12-13 02:38:40.387 [INFO][2669] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"a985a89a-84f4-4c1d-b2e8-5b6cf6f27326", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a", Pod:"nginx-deployment-85f456d6dd-h7p67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali87f9af8a7e9", MAC:"ba:60:bf:4f:5a:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:38:40.404994 env[1244]: 2024-12-13 02:38:40.399 [INFO][2669] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a" Namespace="default" Pod="nginx-deployment-85f456d6dd-h7p67" WorkloadEndpoint="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:38:40.407000 audit[2739]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:40.407000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe9b100e10 a2=0 a3=7ffe9b100dfc items=0 ppid=2267 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:40.433035 env[1244]: time="2024-12-13T02:38:40.432927619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:38:40.433035 env[1244]: time="2024-12-13T02:38:40.432953291Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:38:40.433035 env[1244]: time="2024-12-13T02:38:40.432960363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:38:40.433223 env[1244]: time="2024-12-13T02:38:40.433198113Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a pid=2746 runtime=io.containerd.runc.v2 Dec 13 02:38:40.440662 systemd[1]: Started cri-containerd-bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a.scope. Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.450000 audit: BPF prog-id=104 op=LOAD Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2746 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262366236633739626239386566313133346261313062623031306465 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2746 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262366236633739626239386566313133346261313062623031306465 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit: BPF prog-id=105 op=LOAD Dec 13 02:38:40.451000 audit[2756]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003860e0 items=0 ppid=2746 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262366236633739626239386566313133346261313062623031306465 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit: BPF prog-id=106 op=LOAD Dec 13 02:38:40.451000 audit[2756]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000386128 items=0 ppid=2746 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262366236633739626239386566313133346261313062623031306465 Dec 13 02:38:40.451000 audit: BPF prog-id=106 op=UNLOAD Dec 13 02:38:40.451000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { perfmon } for pid=2756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit[2756]: AVC avc: denied { bpf } for pid=2756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:40.451000 audit: BPF prog-id=107 op=LOAD Dec 13 02:38:40.451000 audit[2756]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000386538 items=0 ppid=2746 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:40.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262366236633739626239386566313133346261313062623031306465 Dec 13 02:38:40.452831 systemd-resolved[1201]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:38:40.471765 env[1244]: time="2024-12-13T02:38:40.471737983Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-h7p67,Uid:a985a89a-84f4-4c1d-b2e8-5b6cf6f27326,Namespace:default,Attempt:1,} returns sandbox id \"bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a\"" Dec 13 02:38:40.692042 kubelet[1609]: E1213 02:38:40.691993 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:41.693027 kubelet[1609]: E1213 02:38:41.692979 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:41.720748 systemd-networkd[1060]: cali87f9af8a7e9: Gained IPv6LL Dec 13 02:38:41.774604 env[1244]: time="2024-12-13T02:38:41.774572582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:41.775244 env[1244]: time="2024-12-13T02:38:41.775227542Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:41.776016 env[1244]: time="2024-12-13T02:38:41.776004039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:41.776689 env[1244]: time="2024-12-13T02:38:41.776672253Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:41.777063 env[1244]: time="2024-12-13T02:38:41.777047579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:38:41.778354 env[1244]: time="2024-12-13T02:38:41.778150808Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:38:41.779739 env[1244]: time="2024-12-13T02:38:41.779721846Z" level=info msg="CreateContainer within sandbox \"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:38:41.785899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount244195165.mount: Deactivated successfully. Dec 13 02:38:41.812442 env[1244]: time="2024-12-13T02:38:41.812403604Z" level=info msg="CreateContainer within sandbox \"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6f560532b41a73514555b95f39918a05460257c8dba5a8a98d08fde85898360c\"" Dec 13 02:38:41.812775 env[1244]: time="2024-12-13T02:38:41.812761210Z" level=info msg="StartContainer for \"6f560532b41a73514555b95f39918a05460257c8dba5a8a98d08fde85898360c\"" Dec 13 02:38:41.827860 systemd[1]: Started cri-containerd-6f560532b41a73514555b95f39918a05460257c8dba5a8a98d08fde85898360c.scope. Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8549e16bd8 items=0 ppid=2609 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:41.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353630353332623431613733353134353535623935663339393138 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit: BPF prog-id=108 op=LOAD Dec 13 02:38:41.839000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0d48 items=0 ppid=2609 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:41.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353630353332623431613733353134353535623935663339393138 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit: BPF prog-id=109 op=LOAD Dec 13 02:38:41.839000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0d98 items=0 ppid=2609 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:41.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353630353332623431613733353134353535623935663339393138 Dec 13 02:38:41.839000 audit: BPF prog-id=109 op=UNLOAD Dec 13 02:38:41.839000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:41.839000 audit: BPF prog-id=110 op=LOAD Dec 13 02:38:41.839000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0e28 items=0 ppid=2609 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:41.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353630353332623431613733353134353535623935663339393138 Dec 13 02:38:41.849563 env[1244]: time="2024-12-13T02:38:41.849537766Z" level=info msg="StartContainer for \"6f560532b41a73514555b95f39918a05460257c8dba5a8a98d08fde85898360c\" returns successfully" Dec 13 02:38:42.028956 kubelet[1609]: I1213 02:38:42.028742 1609 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:38:42.028956 kubelet[1609]: I1213 02:38:42.028760 1609 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:38:42.196684 kubelet[1609]: I1213 02:38:42.196653 1609 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-lwtlv" podStartSLOduration=26.140416327 podStartE2EDuration="29.196639732s" podCreationTimestamp="2024-12-13 02:38:13 +0000 UTC" firstStartedPulling="2024-12-13 02:38:38.721536247 +0000 UTC m=+26.606774001" lastFinishedPulling="2024-12-13 02:38:41.77775965 +0000 UTC m=+29.662997406" observedRunningTime="2024-12-13 02:38:42.195766058 +0000 UTC m=+30.081003818" watchObservedRunningTime="2024-12-13 02:38:42.196639732 +0000 UTC m=+30.081877491" Dec 13 02:38:42.214425 systemd[1]: run-containerd-runc-k8s.io-6f560532b41a73514555b95f39918a05460257c8dba5a8a98d08fde85898360c-runc.5Ev68A.mount: Deactivated successfully. Dec 13 02:38:42.693117 kubelet[1609]: E1213 02:38:42.693095 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:43.696007 kubelet[1609]: E1213 02:38:43.695967 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:44.292537 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount557480623.mount: Deactivated successfully. Dec 13 02:38:44.696261 kubelet[1609]: E1213 02:38:44.696220 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:45.697103 kubelet[1609]: E1213 02:38:45.697075 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:46.097611 env[1244]: time="2024-12-13T02:38:46.097536683Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:46.102241 env[1244]: time="2024-12-13T02:38:46.102217170Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:46.103160 env[1244]: time="2024-12-13T02:38:46.103144418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:46.104279 env[1244]: time="2024-12-13T02:38:46.104261081Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:46.105947 env[1244]: time="2024-12-13T02:38:46.105924999Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:38:46.107719 env[1244]: time="2024-12-13T02:38:46.107694632Z" level=info msg="CreateContainer within sandbox \"bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 02:38:46.113302 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1339580277.mount: Deactivated successfully. Dec 13 02:38:46.116818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2618103758.mount: Deactivated successfully. Dec 13 02:38:46.128456 env[1244]: time="2024-12-13T02:38:46.128422816Z" level=info msg="CreateContainer within sandbox \"bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"6b270dbaef5820a5efa6027620137c5222313af5a2858527a089c7b187148619\"" Dec 13 02:38:46.128924 env[1244]: time="2024-12-13T02:38:46.128868876Z" level=info msg="StartContainer for \"6b270dbaef5820a5efa6027620137c5222313af5a2858527a089c7b187148619\"" Dec 13 02:38:46.140450 systemd[1]: Started cri-containerd-6b270dbaef5820a5efa6027620137c5222313af5a2858527a089c7b187148619.scope. Dec 13 02:38:46.157258 kernel: kauditd_printk_skb: 196 callbacks suppressed Dec 13 02:38:46.157349 kernel: audit: type=1400 audit(1734057526.151:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157401 kernel: audit: type=1400 audit(1734057526.151:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.162673 kernel: audit: type=1400 audit(1734057526.151:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.162732 kernel: audit: type=1400 audit(1734057526.151:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.168091 kernel: audit: type=1400 audit(1734057526.151:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.168157 kernel: audit: type=1400 audit(1734057526.151:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.168179 kernel: audit: type=1400 audit(1734057526.151:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.173276 kernel: audit: type=1400 audit(1734057526.151:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.180647 kernel: audit: type=1400 audit(1734057526.151:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.180725 kernel: audit: type=1400 audit(1734057526.151:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.151000 audit: BPF prog-id=111 op=LOAD Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2746 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:46.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323730646261656635383230613565666136303237363230313337 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2746 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:46.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323730646261656635383230613565666136303237363230313337 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.153000 audit: BPF prog-id=112 op=LOAD Dec 13 02:38:46.153000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025fdc0 items=0 ppid=2746 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:46.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323730646261656635383230613565666136303237363230313337 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.154000 audit: BPF prog-id=113 op=LOAD Dec 13 02:38:46.154000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025fe08 items=0 ppid=2746 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:46.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323730646261656635383230613565666136303237363230313337 Dec 13 02:38:46.156000 audit: BPF prog-id=113 op=UNLOAD Dec 13 02:38:46.156000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:46.157000 audit: BPF prog-id=114 op=LOAD Dec 13 02:38:46.157000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c0218 items=0 ppid=2746 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:46.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662323730646261656635383230613565666136303237363230313337 Dec 13 02:38:46.185741 env[1244]: time="2024-12-13T02:38:46.185719895Z" level=info msg="StartContainer for \"6b270dbaef5820a5efa6027620137c5222313af5a2858527a089c7b187148619\" returns successfully" Dec 13 02:38:46.205518 kubelet[1609]: I1213 02:38:46.205433 1609 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-h7p67" podStartSLOduration=14.572759755 podStartE2EDuration="20.205419s" podCreationTimestamp="2024-12-13 02:38:26 +0000 UTC" firstStartedPulling="2024-12-13 02:38:40.473837994 +0000 UTC m=+28.359075750" lastFinishedPulling="2024-12-13 02:38:46.106497238 +0000 UTC m=+33.991734995" observedRunningTime="2024-12-13 02:38:46.20511479 +0000 UTC m=+34.090352550" watchObservedRunningTime="2024-12-13 02:38:46.205419 +0000 UTC m=+34.090656765" Dec 13 02:38:46.697207 kubelet[1609]: E1213 02:38:46.697176 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:47.698261 kubelet[1609]: E1213 02:38:47.698238 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:48.699322 kubelet[1609]: E1213 02:38:48.699293 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:49.700111 kubelet[1609]: E1213 02:38:49.700067 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:50.694000 audit[2886]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.694000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc392b49c0 a2=0 a3=7ffc392b49ac items=0 ppid=1867 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.697000 audit[2886]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.697000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc392b49c0 a2=0 a3=0 items=0 ppid=1867 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.700605 kubelet[1609]: E1213 02:38:50.700565 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:50.706000 audit[2890]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.706000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc81e75880 a2=0 a3=7ffc81e7586c items=0 ppid=1867 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.711000 audit[2890]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.711000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc81e75880 a2=0 a3=0 items=0 ppid=1867 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.873480 kubelet[1609]: I1213 02:38:50.873453 1609 topology_manager.go:215] "Topology Admit Handler" podUID="435fd863-b8a3-4cf1-ae8c-e5b31e90d44f" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 02:38:50.879562 systemd[1]: Created slice kubepods-besteffort-pod435fd863_b8a3_4cf1_ae8c_e5b31e90d44f.slice. Dec 13 02:38:50.972662 kubelet[1609]: I1213 02:38:50.972575 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/435fd863-b8a3-4cf1-ae8c-e5b31e90d44f-data\") pod \"nfs-server-provisioner-0\" (UID: \"435fd863-b8a3-4cf1-ae8c-e5b31e90d44f\") " pod="default/nfs-server-provisioner-0" Dec 13 02:38:50.972662 kubelet[1609]: I1213 02:38:50.972606 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvhbd\" (UniqueName: \"kubernetes.io/projected/435fd863-b8a3-4cf1-ae8c-e5b31e90d44f-kube-api-access-cvhbd\") pod \"nfs-server-provisioner-0\" (UID: \"435fd863-b8a3-4cf1-ae8c-e5b31e90d44f\") " pod="default/nfs-server-provisioner-0" Dec 13 02:38:51.182845 env[1244]: time="2024-12-13T02:38:51.182818741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:435fd863-b8a3-4cf1-ae8c-e5b31e90d44f,Namespace:default,Attempt:0,}" Dec 13 02:38:51.278887 systemd-networkd[1060]: cali60e51b789ff: Link UP Dec 13 02:38:51.282350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:38:51.282406 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 02:38:51.282485 systemd-networkd[1060]: cali60e51b789ff: Gained carrier Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.212 [INFO][2892] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 435fd863-b8a3-4cf1-ae8c-e5b31e90d44f 1154 0 2024-12-13 02:38:50 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.139 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.212 [INFO][2892] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.231 [INFO][2904] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" HandleID="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.247 [INFO][2904] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" HandleID="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031bc40), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 02:38:51.231274475 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.247 [INFO][2904] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.247 [INFO][2904] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.247 [INFO][2904] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.248 [INFO][2904] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.251 [INFO][2904] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.256 [INFO][2904] ipam/ipam.go 489: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.258 [INFO][2904] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.261 [INFO][2904] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.261 [INFO][2904] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.262 [INFO][2904] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.265 [INFO][2904] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.272 [INFO][2904] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.3/26] block=192.168.110.0/26 handle="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.272 [INFO][2904] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.3/26] handle="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" host="10.67.124.139" Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.272 [INFO][2904] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:38:51.289029 env[1244]: 2024-12-13 02:38:51.272 [INFO][2904] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.3/26] IPv6=[] ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" HandleID="k8s-pod-network.486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Workload="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:38:51.289535 env[1244]: 2024-12-13 02:38:51.273 [INFO][2892] cni-plugin/k8s.go 386: Populated endpoint ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"435fd863-b8a3-4cf1-ae8c-e5b31e90d44f", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:38:51.289535 env[1244]: 2024-12-13 02:38:51.273 [INFO][2892] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.3/32] ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:38:51.289535 env[1244]: 2024-12-13 02:38:51.273 [INFO][2892] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:38:51.289535 env[1244]: 2024-12-13 02:38:51.279 [INFO][2892] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:38:51.289664 env[1244]: 2024-12-13 02:38:51.282 [INFO][2892] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"435fd863-b8a3-4cf1-ae8c-e5b31e90d44f", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.110.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"66:3e:9f:74:11:ca", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:38:51.289664 env[1244]: 2024-12-13 02:38:51.287 [INFO][2892] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.139-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:38:51.303580 env[1244]: time="2024-12-13T02:38:51.303537111Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:38:51.303693 env[1244]: time="2024-12-13T02:38:51.303583802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:38:51.303693 env[1244]: time="2024-12-13T02:38:51.303607355Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:38:51.303818 env[1244]: time="2024-12-13T02:38:51.303791602Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e pid=2931 runtime=io.containerd.runc.v2 Dec 13 02:38:51.314513 systemd[1]: Started cri-containerd-486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e.scope. Dec 13 02:38:51.325000 audit[2963]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:51.329020 kernel: kauditd_printk_skb: 59 callbacks suppressed Dec 13 02:38:51.329078 kernel: audit: type=1325 audit(1734057531.325:709): table=filter:75 family=2 entries=38 op=nft_register_chain pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:38:51.325000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff78bcc400 a2=0 a3=7fff78bcc3ec items=0 ppid=2267 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.333024 kernel: audit: type=1300 audit(1734057531.325:709): arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff78bcc400 a2=0 a3=7fff78bcc3ec items=0 ppid=2267 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.325000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.337107 systemd-resolved[1201]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:38:51.339507 kernel: audit: type=1327 audit(1734057531.325:709): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:38:51.339543 kernel: audit: type=1400 audit(1734057531.333:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.339566 kernel: audit: type=1400 audit(1734057531.333:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.344385 kernel: audit: type=1400 audit(1734057531.333:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.344426 kernel: audit: type=1400 audit(1734057531.333:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.349184 kernel: audit: type=1400 audit(1734057531.333:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.351628 kernel: audit: type=1400 audit(1734057531.333:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.351656 kernel: audit: type=1400 audit(1734057531.333:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit: BPF prog-id=115 op=LOAD Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2931 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438363634306431653165666662626331636435386366396139333063 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2931 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438363634306431653165666662626331636435386366396139333063 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.333000 audit: BPF prog-id=116 op=LOAD Dec 13 02:38:51.333000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c5ec0 items=0 ppid=2931 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438363634306431653165666662626331636435386366396139333063 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit: BPF prog-id=117 op=LOAD Dec 13 02:38:51.336000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002c5f08 items=0 ppid=2931 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438363634306431653165666662626331636435386366396139333063 Dec 13 02:38:51.336000 audit: BPF prog-id=117 op=UNLOAD Dec 13 02:38:51.336000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:51.336000 audit: BPF prog-id=118 op=LOAD Dec 13 02:38:51.336000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b6318 items=0 ppid=2931 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438363634306431653165666662626331636435386366396139333063 Dec 13 02:38:51.362504 env[1244]: time="2024-12-13T02:38:51.362482509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:435fd863-b8a3-4cf1-ae8c-e5b31e90d44f,Namespace:default,Attempt:0,} returns sandbox id \"486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e\"" Dec 13 02:38:51.363334 env[1244]: time="2024-12-13T02:38:51.363322777Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 02:38:51.700714 kubelet[1609]: E1213 02:38:51.700675 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:52.085996 systemd[1]: run-containerd-runc-k8s.io-486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e-runc.UulCBX.mount: Deactivated successfully. Dec 13 02:38:52.675258 kubelet[1609]: E1213 02:38:52.675192 1609 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:52.701754 kubelet[1609]: E1213 02:38:52.701722 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:53.304701 systemd-networkd[1060]: cali60e51b789ff: Gained IPv6LL Dec 13 02:38:53.702691 kubelet[1609]: E1213 02:38:53.702665 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:53.743621 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3060144757.mount: Deactivated successfully. Dec 13 02:38:54.703568 kubelet[1609]: E1213 02:38:54.703535 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:55.628703 env[1244]: time="2024-12-13T02:38:55.628644491Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:55.639641 env[1244]: time="2024-12-13T02:38:55.639621062Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:55.642229 env[1244]: time="2024-12-13T02:38:55.642213307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:55.646764 env[1244]: time="2024-12-13T02:38:55.646748170Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:38:55.647207 env[1244]: time="2024-12-13T02:38:55.647190384Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 02:38:55.648805 env[1244]: time="2024-12-13T02:38:55.648785675Z" level=info msg="CreateContainer within sandbox \"486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 02:38:55.662628 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3332608791.mount: Deactivated successfully. Dec 13 02:38:55.666214 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount875599455.mount: Deactivated successfully. Dec 13 02:38:55.669255 env[1244]: time="2024-12-13T02:38:55.669230311Z" level=info msg="CreateContainer within sandbox \"486640d1e1effbbc1cd58cf9a930cb41a70e89aae141c1a287c8ecf90c9bc19e\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"7e793278acaa5ff30c910dbc6adcb972955c0e99c35e01a1d38728f15be3dc34\"" Dec 13 02:38:55.669827 env[1244]: time="2024-12-13T02:38:55.669806948Z" level=info msg="StartContainer for \"7e793278acaa5ff30c910dbc6adcb972955c0e99c35e01a1d38728f15be3dc34\"" Dec 13 02:38:55.682593 systemd[1]: Started cri-containerd-7e793278acaa5ff30c910dbc6adcb972955c0e99c35e01a1d38728f15be3dc34.scope. Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit: BPF prog-id=119 op=LOAD Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2931 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:55.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373933323738616361613566663330633931306462633661646362 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2931 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:55.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373933323738616361613566663330633931306462633661646362 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit: BPF prog-id=120 op=LOAD Dec 13 02:38:55.691000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003903e0 items=0 ppid=2931 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:55.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373933323738616361613566663330633931306462633661646362 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.691000 audit: BPF prog-id=121 op=LOAD Dec 13 02:38:55.691000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390428 items=0 ppid=2931 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:55.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373933323738616361613566663330633931306462633661646362 Dec 13 02:38:55.691000 audit: BPF prog-id=121 op=UNLOAD Dec 13 02:38:55.691000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:38:55.692000 audit: BPF prog-id=122 op=LOAD Dec 13 02:38:55.692000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000390838 items=0 ppid=2931 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:55.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373933323738616361613566663330633931306462633661646362 Dec 13 02:38:55.703491 env[1244]: time="2024-12-13T02:38:55.703451471Z" level=info msg="StartContainer for \"7e793278acaa5ff30c910dbc6adcb972955c0e99c35e01a1d38728f15be3dc34\" returns successfully" Dec 13 02:38:55.703926 kubelet[1609]: E1213 02:38:55.703898 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:55.729000 audit[3004]: AVC avc: denied { search } for pid=3004 comm="rpcbind" name="crypto" dev="proc" ino=34124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:38:55.729000 audit[3004]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbdd63a30c0 a2=0 a3=0 items=0 ppid=2988 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 key=(null) Dec 13 02:38:55.729000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 02:38:55.751000 audit[3009]: AVC avc: denied { search } for pid=3009 comm="dbus-daemon" name="crypto" dev="proc" ino=34124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:38:55.751000 audit[3009]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2b4e01f0c0 a2=0 a3=0 items=0 ppid=2988 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 key=(null) Dec 13 02:38:55.751000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:38:55.753000 audit[3010]: AVC avc: denied { watch } for pid=3010 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=533602 scontext=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c729,c866 tclass=dir permissive=0 Dec 13 02:38:55.753000 audit[3010]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=563d78349940 a2=2c8 a3=7ffcf55002ac items=0 ppid=2988 pid=3010 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 key=(null) Dec 13 02:38:55.753000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:38:55.756000 audit[3011]: AVC avc: denied { read } for pid=3011 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34150 scontext=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 02:38:55.756000 audit[3011]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f04081ff320 a1=80000 a2=d a3=7ffe73c25f70 items=0 ppid=2988 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 key=(null) Dec 13 02:38:55.756000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:38:55.757000 audit[3011]: AVC avc: denied { search } for pid=3011 comm="ganesha.nfsd" name="crypto" dev="proc" ino=34124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:38:55.757000 audit[3011]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f04077530c0 a2=0 a3=0 items=0 ppid=2988 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c729,c866 key=(null) Dec 13 02:38:55.757000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:38:56.231458 kubelet[1609]: I1213 02:38:56.231416 1609 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.946648414 podStartE2EDuration="6.231402928s" podCreationTimestamp="2024-12-13 02:38:50 +0000 UTC" firstStartedPulling="2024-12-13 02:38:51.363200426 +0000 UTC m=+39.248438183" lastFinishedPulling="2024-12-13 02:38:55.647954941 +0000 UTC m=+43.533192697" observedRunningTime="2024-12-13 02:38:56.226005445 +0000 UTC m=+44.111243211" watchObservedRunningTime="2024-12-13 02:38:56.231402928 +0000 UTC m=+44.116640688" Dec 13 02:38:56.416000 audit[3031]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:56.417417 kernel: kauditd_printk_skb: 122 callbacks suppressed Dec 13 02:38:56.417475 kernel: audit: type=1325 audit(1734057536.416:751): table=filter:76 family=2 entries=20 op=nft_register_rule pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:56.416000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff8d0625d0 a2=0 a3=7fff8d0625bc items=0 ppid=1867 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:56.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:56.425061 kernel: audit: type=1300 audit(1734057536.416:751): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff8d0625d0 a2=0 a3=7fff8d0625bc items=0 ppid=1867 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:56.425101 kernel: audit: type=1327 audit(1734057536.416:751): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:56.425119 kernel: audit: type=1325 audit(1734057536.419:752): table=nat:77 family=2 entries=106 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:56.419000 audit[3031]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:56.419000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff8d0625d0 a2=0 a3=7fff8d0625bc items=0 ppid=1867 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:56.430781 kernel: audit: type=1300 audit(1734057536.419:752): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff8d0625d0 a2=0 a3=7fff8d0625bc items=0 ppid=1867 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:56.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:56.433021 kernel: audit: type=1327 audit(1734057536.419:752): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:56.704698 kubelet[1609]: E1213 02:38:56.704624 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:57.704746 kubelet[1609]: E1213 02:38:57.704685 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:58.705512 kubelet[1609]: E1213 02:38:58.705475 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:38:59.706311 kubelet[1609]: E1213 02:38:59.706284 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:00.707439 kubelet[1609]: E1213 02:39:00.707411 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:00.834156 systemd[1]: run-containerd-runc-k8s.io-bb97160a64c1b9acb7f90c128796317e82f29a46714c31c22240c86141a68799-runc.TUv13X.mount: Deactivated successfully. Dec 13 02:39:01.708595 kubelet[1609]: E1213 02:39:01.708504 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:02.709155 kubelet[1609]: E1213 02:39:02.709133 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:03.710561 kubelet[1609]: E1213 02:39:03.710534 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:04.711409 kubelet[1609]: E1213 02:39:04.711382 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:05.247884 kubelet[1609]: I1213 02:39:05.247856 1609 topology_manager.go:215] "Topology Admit Handler" podUID="343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb" podNamespace="default" podName="test-pod-1" Dec 13 02:39:05.251217 systemd[1]: Created slice kubepods-besteffort-pod343c4bf0_87de_48c5_a0cb_d7ccdbd5cbdb.slice. Dec 13 02:39:05.436920 kubelet[1609]: I1213 02:39:05.436892 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fwmdg\" (UniqueName: \"kubernetes.io/projected/343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb-kube-api-access-fwmdg\") pod \"test-pod-1\" (UID: \"343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb\") " pod="default/test-pod-1" Dec 13 02:39:05.437058 kubelet[1609]: I1213 02:39:05.437046 1609 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f4d52c85-3a81-45d5-ab4e-4889dadbdedd\" (UniqueName: \"kubernetes.io/nfs/343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb-pvc-f4d52c85-3a81-45d5-ab4e-4889dadbdedd\") pod \"test-pod-1\" (UID: \"343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb\") " pod="default/test-pod-1" Dec 13 02:39:05.559000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.563480 kernel: Failed to create system directory netfs Dec 13 02:39:05.563527 kernel: audit: type=1400 audit(1734057545.559:753): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.559000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.566790 kernel: Failed to create system directory netfs Dec 13 02:39:05.566824 kernel: audit: type=1400 audit(1734057545.559:753): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.566839 kernel: Failed to create system directory netfs Dec 13 02:39:05.570075 kernel: audit: type=1400 audit(1734057545.559:753): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.570101 kernel: Failed to create system directory netfs Dec 13 02:39:05.559000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.573335 kernel: audit: type=1400 audit(1734057545.559:753): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.559000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.559000 audit[3065]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e47d405e0 a1=153bc a2=561e16c832b0 a3=5 items=0 ppid=1097 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:05.559000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:39:05.580300 kernel: audit: type=1300 audit(1734057545.559:753): arch=c000003e syscall=175 success=yes exit=0 a0=561e47d405e0 a1=153bc a2=561e16c832b0 a3=5 items=0 ppid=1097 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:05.580323 kernel: audit: type=1327 audit(1734057545.559:753): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:39:05.586796 kernel: Failed to create system directory fscache Dec 13 02:39:05.586836 kernel: Failed to create system directory fscache Dec 13 02:39:05.586851 kernel: Failed to create system directory fscache Dec 13 02:39:05.589527 kernel: audit: type=1400 audit(1734057545.583:754): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.590827 kernel: Failed to create system directory fscache Dec 13 02:39:05.590852 kernel: Failed to create system directory fscache Dec 13 02:39:05.590866 kernel: audit: type=1400 audit(1734057545.583:754): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.594132 kernel: Failed to create system directory fscache Dec 13 02:39:05.594153 kernel: audit: type=1400 audit(1734057545.583:754): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.597377 kernel: Failed to create system directory fscache Dec 13 02:39:05.597401 kernel: audit: type=1400 audit(1734057545.583:754): avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.600620 kernel: Failed to create system directory fscache Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.601391 kernel: Failed to create system directory fscache Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.602720 kernel: Failed to create system directory fscache Dec 13 02:39:05.602763 kernel: Failed to create system directory fscache Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.603446 kernel: Failed to create system directory fscache Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.604772 kernel: Failed to create system directory fscache Dec 13 02:39:05.604797 kernel: Failed to create system directory fscache Dec 13 02:39:05.583000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.583000 audit[3065]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e47f559c0 a1=4c0fc a2=561e16c832b0 a3=5 items=0 ppid=1097 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:05.583000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:39:05.606368 kernel: FS-Cache: Loaded Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.629825 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.629863 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.630516 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.631830 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.631855 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.632507 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.633801 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.633825 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.634480 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.635783 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.635807 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.636464 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.637759 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.637782 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.638492 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.639788 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.639812 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.640464 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.641758 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.641782 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.642439 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.643738 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.643762 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.644414 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.645712 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.645736 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.646395 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.647690 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.647714 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.648390 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.649661 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.649681 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.650373 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.651647 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.651673 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.652963 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.652995 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.653659 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.654388 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.655816 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.655841 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.656499 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.657799 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.657823 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.658473 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.659773 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.659799 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.660450 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.661750 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.661774 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.662424 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.663722 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.663746 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.664405 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.665695 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.665719 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.666375 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.667671 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.667695 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.668380 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.669658 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.669684 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.670370 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.671096 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.671755 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.672421 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.673722 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.673746 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.674402 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.675700 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.675720 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.676378 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.677686 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.678407 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.678428 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.679738 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.679762 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.680411 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.681710 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.681736 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.682391 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.683689 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.683714 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.684367 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.685668 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.685694 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.686405 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.687721 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.687745 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.688403 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.689701 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.689726 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.690378 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.691689 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.691713 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.692391 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.693663 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.693687 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.694399 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.695668 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.695689 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.696371 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.697642 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.697666 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.698957 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.698981 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.699633 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.700929 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.700954 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.701607 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.702917 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.702951 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.703613 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.704929 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.704950 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.705608 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.706916 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.706938 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.707620 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.708926 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.708951 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.709611 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.710912 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.710937 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.711594 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.621000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.712316 kubelet[1609]: E1213 02:39:05.711636 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:05.712520 kernel: Failed to create system directory sunrpc Dec 13 02:39:05.719375 kernel: RPC: Registered named UNIX socket transport module. Dec 13 02:39:05.719449 kernel: RPC: Registered udp transport module. Dec 13 02:39:05.719467 kernel: RPC: Registered tcp transport module. Dec 13 02:39:05.719480 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 02:39:05.621000 audit[3065]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e47fa1ad0 a1=1a7f1c a2=561e16c832b0 a3=5 items=6 ppid=1097 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:05.621000 audit: CWD cwd="/" Dec 13 02:39:05.621000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:39:05.621000 audit: PATH item=1 name=(null) inode=35328 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:39:05.621000 audit: PATH item=2 name=(null) inode=35328 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:39:05.621000 audit: PATH item=3 name=(null) inode=35329 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:39:05.621000 audit: PATH item=4 name=(null) inode=35328 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:39:05.621000 audit: PATH item=5 name=(null) inode=35330 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:39:05.621000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.750690 kernel: Failed to create system directory nfs Dec 13 02:39:05.750722 kernel: Failed to create system directory nfs Dec 13 02:39:05.750737 kernel: Failed to create system directory nfs Dec 13 02:39:05.750749 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.751766 kernel: Failed to create system directory nfs Dec 13 02:39:05.751800 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.752956 kernel: Failed to create system directory nfs Dec 13 02:39:05.752979 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.753722 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.754640 kernel: Failed to create system directory nfs Dec 13 02:39:05.754669 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.755814 kernel: Failed to create system directory nfs Dec 13 02:39:05.755852 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.756931 kernel: Failed to create system directory nfs Dec 13 02:39:05.756954 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.758639 kernel: Failed to create system directory nfs Dec 13 02:39:05.758670 kernel: Failed to create system directory nfs Dec 13 02:39:05.758682 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.759775 kernel: Failed to create system directory nfs Dec 13 02:39:05.759802 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.760375 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.761505 kernel: Failed to create system directory nfs Dec 13 02:39:05.761531 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.762650 kernel: Failed to create system directory nfs Dec 13 02:39:05.762676 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.763830 kernel: Failed to create system directory nfs Dec 13 02:39:05.763854 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.764372 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.765495 kernel: Failed to create system directory nfs Dec 13 02:39:05.765520 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.766639 kernel: Failed to create system directory nfs Dec 13 02:39:05.766666 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.767774 kernel: Failed to create system directory nfs Dec 13 02:39:05.767796 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.768969 kernel: Failed to create system directory nfs Dec 13 02:39:05.768990 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.770627 kernel: Failed to create system directory nfs Dec 13 02:39:05.770652 kernel: Failed to create system directory nfs Dec 13 02:39:05.770665 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.771772 kernel: Failed to create system directory nfs Dec 13 02:39:05.777204 kernel: Failed to create system directory nfs Dec 13 02:39:05.777227 kernel: Failed to create system directory nfs Dec 13 02:39:05.777243 kernel: Failed to create system directory nfs Dec 13 02:39:05.777258 kernel: Failed to create system directory nfs Dec 13 02:39:05.777271 kernel: Failed to create system directory nfs Dec 13 02:39:05.777284 kernel: Failed to create system directory nfs Dec 13 02:39:05.778732 kernel: Failed to create system directory nfs Dec 13 02:39:05.778750 kernel: Failed to create system directory nfs Dec 13 02:39:05.778762 kernel: Failed to create system directory nfs Dec 13 02:39:05.778774 kernel: Failed to create system directory nfs Dec 13 02:39:05.778786 kernel: Failed to create system directory nfs Dec 13 02:39:05.778804 kernel: Failed to create system directory nfs Dec 13 02:39:05.778820 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.779841 kernel: Failed to create system directory nfs Dec 13 02:39:05.779872 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.781015 kernel: Failed to create system directory nfs Dec 13 02:39:05.781051 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.781584 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.782693 kernel: Failed to create system directory nfs Dec 13 02:39:05.782721 kernel: Failed to create system directory nfs Dec 13 02:39:05.743000 audit[3065]: AVC avc: denied { confidentiality } for pid=3065 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.743000 audit[3065]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e481c2700 a1=16e97c a2=561e16c832b0 a3=5 items=0 ppid=1097 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:05.797411 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 02:39:05.743000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.845019 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845083 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845103 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845115 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845127 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845139 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845151 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845163 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845174 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.845186 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.846241 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.846273 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.846822 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.847431 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.848637 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.848675 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.849808 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.849848 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.851552 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.851589 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.851614 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.852762 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.852813 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.853917 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.853964 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.855705 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.855751 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.855775 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.856870 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.856899 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.858744 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.858783 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.858798 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.859920 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.859961 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.860507 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.861686 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.861724 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.862813 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.862849 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.863405 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.864555 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.864581 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.865709 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.865735 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.866857 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.866887 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.868591 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.868623 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.868637 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.869765 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.869793 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.870916 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.870955 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.872664 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.872697 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.872711 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.873831 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.873860 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.874439 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.875671 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.875700 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.876757 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.876780 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.877917 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.877964 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.879659 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.879685 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.879699 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.880803 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.881451 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.881476 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.882623 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.882650 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.883773 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.883802 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.884938 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.884973 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.885489 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.886667 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.886693 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.887819 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.887848 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.888406 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.889569 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.889603 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.890743 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.890770 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.891943 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.891978 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.892513 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.893665 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.893693 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.830000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.894803 kernel: Failed to create system directory nfs4 Dec 13 02:39:05.987894 kernel: NFS: Registering the id_resolver key type Dec 13 02:39:05.988201 kernel: Key type id_resolver registered Dec 13 02:39:05.988253 kernel: Key type id_legacy registered Dec 13 02:39:05.830000 audit[3070]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f59ac144010 a1=208de4 a2=5567621c42b0 a3=5 items=0 ppid=1097 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:05.830000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.997958 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.997994 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.998028 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.999750 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.999777 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.999800 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.000943 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.000977 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.001520 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.002764 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.002802 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.004000 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.004047 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.004592 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.005836 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.005873 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.006405 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.007629 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.007655 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.008822 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.008854 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.009396 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.010617 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.010649 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:06.011816 kernel: Failed to create system directory rpcgss Dec 13 02:39:06.011842 kernel: Failed to create system directory rpcgss Dec 13 02:39:05.994000 audit[3072]: AVC avc: denied { confidentiality } for pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:39:05.994000 audit[3072]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa0e3afe010 a1=70af4 a2=5612b889b2b0 a3=5 items=0 ppid=1097 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:05.994000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 02:39:06.025927 nfsidmap[3078]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 02:39:06.027783 nfsidmap[3079]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 02:39:06.037000 audit[1357]: AVC avc: denied { watch_reads } for pid=1357 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2540 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:39:06.037000 audit[1357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f480a54e10 a2=10 a3=e0e43c8aff20b0cf items=0 ppid=1 pid=1357 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.037000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:39:06.037000 audit[1357]: AVC avc: denied { watch_reads } for pid=1357 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2540 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:39:06.037000 audit[1357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f480a54e10 a2=10 a3=e0e43c8aff20b0cf items=0 ppid=1 pid=1357 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.037000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:39:06.037000 audit[1357]: AVC avc: denied { watch_reads } for pid=1357 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2540 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:39:06.037000 audit[1357]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f480a54e10 a2=10 a3=e0e43c8aff20b0cf items=0 ppid=1 pid=1357 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.037000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:39:06.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2540 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:39:06.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2540 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:39:06.037000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2540 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:39:06.154086 env[1244]: time="2024-12-13T02:39:06.154053393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb,Namespace:default,Attempt:0,}" Dec 13 02:39:06.247750 systemd-networkd[1060]: cali5ec59c6bf6e: Link UP Dec 13 02:39:06.250039 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:39:06.250395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 02:39:06.250108 systemd-networkd[1060]: cali5ec59c6bf6e: Gained carrier Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.206 [INFO][3080] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.139-k8s-test--pod--1-eth0 default 343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb 1220 0 2024-12-13 02:38:51 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.139 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.206 [INFO][3080] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.223 [INFO][3092] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" HandleID="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Workload="10.67.124.139-k8s-test--pod--1-eth0" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.231 [INFO][3092] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" HandleID="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Workload="10.67.124.139-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bc530), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.139", "pod":"test-pod-1", "timestamp":"2024-12-13 02:39:06.22383228 +0000 UTC"}, Hostname:"10.67.124.139", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.231 [INFO][3092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.231 [INFO][3092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.231 [INFO][3092] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.139' Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.232 [INFO][3092] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.234 [INFO][3092] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.236 [INFO][3092] ipam/ipam.go 489: Trying affinity for 192.168.110.0/26 host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.237 [INFO][3092] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.238 [INFO][3092] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.0/26 host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.238 [INFO][3092] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.0/26 handle="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.239 [INFO][3092] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90 Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.241 [INFO][3092] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.0/26 handle="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.244 [INFO][3092] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.4/26] block=192.168.110.0/26 handle="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.244 [INFO][3092] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.4/26] handle="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" host="10.67.124.139" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.244 [INFO][3092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.244 [INFO][3092] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.4/26] IPv6=[] ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" HandleID="k8s-pod-network.e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Workload="10.67.124.139-k8s-test--pod--1-eth0" Dec 13 02:39:06.265727 env[1244]: 2024-12-13 02:39:06.245 [INFO][3080] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb", ResourceVersion:"1220", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:39:06.266266 env[1244]: 2024-12-13 02:39:06.245 [INFO][3080] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.4/32] ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Dec 13 02:39:06.266266 env[1244]: 2024-12-13 02:39:06.245 [INFO][3080] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Dec 13 02:39:06.266266 env[1244]: 2024-12-13 02:39:06.250 [INFO][3080] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Dec 13 02:39:06.266266 env[1244]: 2024-12-13 02:39:06.255 [INFO][3080] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb", ResourceVersion:"1220", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"16:9e:e6:cc:f2:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:39:06.266266 env[1244]: 2024-12-13 02:39:06.264 [INFO][3080] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.139-k8s-test--pod--1-eth0" Dec 13 02:39:06.273137 env[1244]: time="2024-12-13T02:39:06.273093030Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:39:06.273239 env[1244]: time="2024-12-13T02:39:06.273123618Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:39:06.273239 env[1244]: time="2024-12-13T02:39:06.273228625Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:39:06.273453 env[1244]: time="2024-12-13T02:39:06.273426887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90 pid=3116 runtime=io.containerd.runc.v2 Dec 13 02:39:06.281963 systemd[1]: Started cri-containerd-e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90.scope. Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit: BPF prog-id=123 op=LOAD Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643836303432356535316534326563303235666436393732376162 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643836303432356535316534326563303235666436393732376162 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit: BPF prog-id=124 op=LOAD Dec 13 02:39:06.297000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ec000 items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643836303432356535316534326563303235666436393732376162 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit: BPF prog-id=125 op=LOAD Dec 13 02:39:06.297000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ec048 items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643836303432356535316534326563303235666436393732376162 Dec 13 02:39:06.297000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:39:06.297000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.297000 audit: BPF prog-id=126 op=LOAD Dec 13 02:39:06.297000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ec458 items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643836303432356535316534326563303235666436393732376162 Dec 13 02:39:06.298000 audit[3144]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:39:06.298000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe2de1dbe0 a2=0 a3=7ffe2de1dbcc items=0 ppid=2267 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.298000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:39:06.302336 systemd-resolved[1201]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:39:06.321843 env[1244]: time="2024-12-13T02:39:06.321816904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:343c4bf0-87de-48c5-a0cb-d7ccdbd5cbdb,Namespace:default,Attempt:0,} returns sandbox id \"e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90\"" Dec 13 02:39:06.322741 env[1244]: time="2024-12-13T02:39:06.322649176Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:39:06.678214 env[1244]: time="2024-12-13T02:39:06.678174224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:39:06.678713 env[1244]: time="2024-12-13T02:39:06.678697750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:39:06.679754 env[1244]: time="2024-12-13T02:39:06.679741390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:39:06.680758 env[1244]: time="2024-12-13T02:39:06.680745521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:39:06.681209 env[1244]: time="2024-12-13T02:39:06.681194525Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:39:06.682683 env[1244]: time="2024-12-13T02:39:06.682669400Z" level=info msg="CreateContainer within sandbox \"e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 02:39:06.690805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2987217860.mount: Deactivated successfully. Dec 13 02:39:06.694397 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1232169949.mount: Deactivated successfully. Dec 13 02:39:06.698730 env[1244]: time="2024-12-13T02:39:06.698711190Z" level=info msg="CreateContainer within sandbox \"e6d860425e51e42ec025fd69727ab7157a733e16c8a1c2a4fcacf9eb2f8a7d90\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"f4859e637545de0e039ce7bbcea120ba760106ca24ec7259cc1ffbe3d5f493c9\"" Dec 13 02:39:06.699276 env[1244]: time="2024-12-13T02:39:06.699262741Z" level=info msg="StartContainer for \"f4859e637545de0e039ce7bbcea120ba760106ca24ec7259cc1ffbe3d5f493c9\"" Dec 13 02:39:06.708461 systemd[1]: Started cri-containerd-f4859e637545de0e039ce7bbcea120ba760106ca24ec7259cc1ffbe3d5f493c9.scope. Dec 13 02:39:06.711851 kubelet[1609]: E1213 02:39:06.711822 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit: BPF prog-id=127 op=LOAD Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3116 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383539653633373534356465306530333963653762626365613132 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3116 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383539653633373534356465306530333963653762626365613132 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit: BPF prog-id=128 op=LOAD Dec 13 02:39:06.717000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000f3dc0 items=0 ppid=3116 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383539653633373534356465306530333963653762626365613132 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.717000 audit: BPF prog-id=129 op=LOAD Dec 13 02:39:06.717000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000f3e08 items=0 ppid=3116 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383539653633373534356465306530333963653762626365613132 Dec 13 02:39:06.717000 audit: BPF prog-id=129 op=UNLOAD Dec 13 02:39:06.718000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:39:06.718000 audit: BPF prog-id=130 op=LOAD Dec 13 02:39:06.718000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d2218 items=0 ppid=3116 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:06.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383539653633373534356465306530333963653762626365613132 Dec 13 02:39:06.726592 env[1244]: time="2024-12-13T02:39:06.726565822Z" level=info msg="StartContainer for \"f4859e637545de0e039ce7bbcea120ba760106ca24ec7259cc1ffbe3d5f493c9\" returns successfully" Dec 13 02:39:07.320568 systemd-networkd[1060]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 02:39:07.712700 kubelet[1609]: E1213 02:39:07.712675 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:08.713449 kubelet[1609]: E1213 02:39:08.713410 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:09.713897 kubelet[1609]: E1213 02:39:09.713823 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:10.713949 kubelet[1609]: E1213 02:39:10.713917 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:11.714936 kubelet[1609]: E1213 02:39:11.714899 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:12.674800 kubelet[1609]: E1213 02:39:12.674771 1609 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:12.715698 kubelet[1609]: E1213 02:39:12.715676 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:39:12.930855 env[1244]: time="2024-12-13T02:39:12.930727020Z" level=info msg="StopPodSandbox for \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\"" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.958 [WARNING][3232] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--lwtlv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b94ced8d-aa0b-4b3d-b742-77b9282d98e3", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e", Pod:"csi-node-driver-lwtlv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic2f4f999683", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.958 [INFO][3232] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.958 [INFO][3232] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" iface="eth0" netns="" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.958 [INFO][3232] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.958 [INFO][3232] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.974 [INFO][3239] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.974 [INFO][3239] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.974 [INFO][3239] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.978 [WARNING][3239] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.978 [INFO][3239] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.979 [INFO][3239] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:39:12.981479 env[1244]: 2024-12-13 02:39:12.980 [INFO][3232] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:12.981954 env[1244]: time="2024-12-13T02:39:12.981933080Z" level=info msg="TearDown network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\" successfully" Dec 13 02:39:12.982007 env[1244]: time="2024-12-13T02:39:12.981995091Z" level=info msg="StopPodSandbox for \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\" returns successfully" Dec 13 02:39:12.982479 env[1244]: time="2024-12-13T02:39:12.982458228Z" level=info msg="RemovePodSandbox for \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\"" Dec 13 02:39:12.982513 env[1244]: time="2024-12-13T02:39:12.982482579Z" level=info msg="Forcibly stopping sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\"" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.009 [WARNING][3257] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-csi--node--driver--lwtlv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b94ced8d-aa0b-4b3d-b742-77b9282d98e3", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"8c73a82516d45dfb9b2f4bf8aa662dc585bd2f541297ac749e87c8f96158779e", Pod:"csi-node-driver-lwtlv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic2f4f999683", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.009 [INFO][3257] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.009 [INFO][3257] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" iface="eth0" netns="" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.009 [INFO][3257] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.009 [INFO][3257] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.027 [INFO][3263] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.027 [INFO][3263] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.027 [INFO][3263] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.031 [WARNING][3263] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.031 [INFO][3263] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" HandleID="k8s-pod-network.f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Workload="10.67.124.139-k8s-csi--node--driver--lwtlv-eth0" Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.032 [INFO][3263] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:39:13.034321 env[1244]: 2024-12-13 02:39:13.033 [INFO][3257] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15" Dec 13 02:39:13.034754 env[1244]: time="2024-12-13T02:39:13.034733664Z" level=info msg="TearDown network for sandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\" successfully" Dec 13 02:39:13.035904 env[1244]: time="2024-12-13T02:39:13.035889274Z" level=info msg="RemovePodSandbox \"f2fb7d08d4527d2209438df18982ea130105b8470300ffd4b5b388372d394f15\" returns successfully" Dec 13 02:39:13.036292 env[1244]: time="2024-12-13T02:39:13.036279752Z" level=info msg="StopPodSandbox for \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\"" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.074 [WARNING][3281] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"a985a89a-84f4-4c1d-b2e8-5b6cf6f27326", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a", Pod:"nginx-deployment-85f456d6dd-h7p67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali87f9af8a7e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.074 [INFO][3281] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.074 [INFO][3281] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" iface="eth0" netns="" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.074 [INFO][3281] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.074 [INFO][3281] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.106 [INFO][3287] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.106 [INFO][3287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.106 [INFO][3287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.110 [WARNING][3287] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.110 [INFO][3287] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.112 [INFO][3287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:39:13.113597 env[1244]: 2024-12-13 02:39:13.112 [INFO][3281] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.113597 env[1244]: time="2024-12-13T02:39:13.113614934Z" level=info msg="TearDown network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\" successfully" Dec 13 02:39:13.114048 env[1244]: time="2024-12-13T02:39:13.113649458Z" level=info msg="StopPodSandbox for \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\" returns successfully" Dec 13 02:39:13.114048 env[1244]: time="2024-12-13T02:39:13.113980433Z" level=info msg="RemovePodSandbox for \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\"" Dec 13 02:39:13.114048 env[1244]: time="2024-12-13T02:39:13.114000061Z" level=info msg="Forcibly stopping sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\"" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.137 [WARNING][3305] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"a985a89a-84f4-4c1d-b2e8-5b6cf6f27326", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 38, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.139", ContainerID:"bb6b6c79bb98ef1134ba10bb010de2f6820a532ad664e06cb0ec1f424f9c106a", Pod:"nginx-deployment-85f456d6dd-h7p67", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali87f9af8a7e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.137 [INFO][3305] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.137 [INFO][3305] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" iface="eth0" netns="" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.137 [INFO][3305] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.137 [INFO][3305] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.154 [INFO][3313] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.154 [INFO][3313] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.154 [INFO][3313] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.158 [WARNING][3313] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.158 [INFO][3313] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" HandleID="k8s-pod-network.bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Workload="10.67.124.139-k8s-nginx--deployment--85f456d6dd--h7p67-eth0" Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.159 [INFO][3313] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:39:13.161046 env[1244]: 2024-12-13 02:39:13.160 [INFO][3305] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50" Dec 13 02:39:13.161491 env[1244]: time="2024-12-13T02:39:13.161109860Z" level=info msg="TearDown network for sandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\" successfully" Dec 13 02:39:13.162322 env[1244]: time="2024-12-13T02:39:13.162302380Z" level=info msg="RemovePodSandbox \"bdd32fd11e00582c663c412bb7193be8ca4a1a21fff1b906b8599a7d779c9f50\" returns successfully" Dec 13 02:39:13.716955 kubelet[1609]: E1213 02:39:13.716920 1609 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"