Dec 13 02:30:27.647979 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:30:27.647993 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:30:27.647999 kernel: Disabled fast string operations Dec 13 02:30:27.648003 kernel: BIOS-provided physical RAM map: Dec 13 02:30:27.648007 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 02:30:27.648011 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 02:30:27.648017 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 02:30:27.648021 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 02:30:27.648025 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 02:30:27.648029 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 02:30:27.648033 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 02:30:27.648037 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 02:30:27.648041 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 02:30:27.648045 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 02:30:27.648051 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 02:30:27.648055 kernel: NX (Execute Disable) protection: active Dec 13 02:30:27.648060 kernel: SMBIOS 2.7 present. Dec 13 02:30:27.648064 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 02:30:27.648069 kernel: vmware: hypercall mode: 0x00 Dec 13 02:30:27.648073 kernel: Hypervisor detected: VMware Dec 13 02:30:27.648078 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 02:30:27.648082 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 02:30:27.648087 kernel: vmware: using clock offset of 4113654278 ns Dec 13 02:30:27.648091 kernel: tsc: Detected 3408.000 MHz processor Dec 13 02:30:27.648096 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:30:27.648101 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:30:27.648105 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 02:30:27.648110 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:30:27.648114 kernel: total RAM covered: 3072M Dec 13 02:30:27.648120 kernel: Found optimal setting for mtrr clean up Dec 13 02:30:27.648125 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 02:30:27.648129 kernel: Using GB pages for direct mapping Dec 13 02:30:27.648134 kernel: ACPI: Early table checksum verification disabled Dec 13 02:30:27.648138 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 02:30:27.648142 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 02:30:27.648147 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 02:30:27.648152 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 02:30:27.648156 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:30:27.648160 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:30:27.648166 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 02:30:27.648173 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 02:30:27.648177 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 02:30:27.648182 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 02:30:27.648187 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 02:30:27.648193 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 02:30:27.648198 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 02:30:27.648203 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 02:30:27.648208 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:30:27.648213 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:30:27.648217 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 02:30:27.648222 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 02:30:27.648227 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 02:30:27.648232 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 02:30:27.648238 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 02:30:27.648242 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 02:30:27.648247 kernel: system APIC only can use physical flat Dec 13 02:30:27.648252 kernel: Setting APIC routing to physical flat. Dec 13 02:30:27.648257 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:30:27.648261 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 02:30:27.648266 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 02:30:27.648271 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 02:30:27.648276 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 02:30:27.648281 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 02:30:27.648286 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 02:30:27.648291 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 02:30:27.648295 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 02:30:27.648300 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 02:30:27.648305 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 02:30:27.648309 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 02:30:27.648314 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 02:30:27.648319 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 02:30:27.648324 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 02:30:27.648329 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 02:30:27.648334 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 02:30:27.648339 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 02:30:27.648343 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 02:30:27.648348 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 02:30:27.648353 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 02:30:27.648358 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 02:30:27.648363 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 02:30:27.648368 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 02:30:27.648372 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 02:30:27.648378 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 02:30:27.648383 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 02:30:27.648387 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 02:30:27.648392 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 02:30:27.648397 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 02:30:27.648402 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 02:30:27.648406 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 02:30:27.648411 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 02:30:27.648416 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 02:30:27.648421 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 02:30:27.648426 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 02:30:27.648431 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 02:30:27.648436 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 02:30:27.648441 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 02:30:27.648445 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 02:30:27.648450 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 02:30:27.648455 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 02:30:27.648459 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 02:30:27.648464 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 02:30:27.648469 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 02:30:27.648474 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 02:30:27.648479 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 02:30:27.648484 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 02:30:27.648489 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 02:30:27.648493 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 02:30:27.648498 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 02:30:27.648503 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 02:30:27.648507 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 02:30:27.648512 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 02:30:27.648517 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 02:30:27.648523 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 02:30:27.648527 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 02:30:27.648542 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 02:30:27.648547 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 02:30:27.648552 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 02:30:27.648560 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 02:30:27.648570 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 02:30:27.648575 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 02:30:27.651558 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 02:30:27.651565 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 02:30:27.651571 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 02:30:27.651579 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 02:30:27.651584 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 02:30:27.651589 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 02:30:27.651594 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 02:30:27.651599 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 02:30:27.651604 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 02:30:27.651610 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 02:30:27.651616 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 02:30:27.651621 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 02:30:27.651626 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 02:30:27.651631 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 02:30:27.651636 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 02:30:27.651642 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 02:30:27.651647 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 02:30:27.651652 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 02:30:27.651657 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 02:30:27.651662 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 02:30:27.651668 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 02:30:27.651673 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 02:30:27.651679 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 02:30:27.651684 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 02:30:27.651689 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 02:30:27.651694 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 02:30:27.651699 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 02:30:27.651704 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 02:30:27.651709 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 02:30:27.651715 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 02:30:27.651720 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 02:30:27.651725 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 02:30:27.651730 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 02:30:27.651735 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 02:30:27.651740 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 02:30:27.651745 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 02:30:27.651750 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 02:30:27.651756 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 02:30:27.651761 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 02:30:27.651767 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 02:30:27.651772 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 02:30:27.651777 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 02:30:27.651782 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 02:30:27.651787 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 02:30:27.651792 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 02:30:27.651797 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 02:30:27.651803 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 02:30:27.651808 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 02:30:27.651813 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 02:30:27.651819 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 02:30:27.651824 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 02:30:27.651845 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 02:30:27.651850 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 02:30:27.651855 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 02:30:27.651860 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 02:30:27.651865 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 02:30:27.651870 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 02:30:27.651875 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 02:30:27.651880 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 02:30:27.651886 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 02:30:27.651891 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 02:30:27.651896 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 02:30:27.651901 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 02:30:27.651906 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 02:30:27.651911 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 02:30:27.651916 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:30:27.651922 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 02:30:27.651927 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 02:30:27.651932 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 02:30:27.651938 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 02:30:27.651943 kernel: Zone ranges: Dec 13 02:30:27.651948 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:30:27.651954 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 02:30:27.651959 kernel: Normal empty Dec 13 02:30:27.651964 kernel: Movable zone start for each node Dec 13 02:30:27.651969 kernel: Early memory node ranges Dec 13 02:30:27.651975 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 02:30:27.651980 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 02:30:27.651986 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 02:30:27.651991 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 02:30:27.652002 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:30:27.652016 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 02:30:27.652023 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 02:30:27.652031 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 02:30:27.652040 kernel: system APIC only can use physical flat Dec 13 02:30:27.652045 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 02:30:27.652050 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 02:30:27.652057 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 02:30:27.652062 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 02:30:27.652067 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 02:30:27.652072 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 02:30:27.652077 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 02:30:27.652083 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 02:30:27.652088 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 02:30:27.652093 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 02:30:27.652098 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 02:30:27.652103 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 02:30:27.652109 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 02:30:27.652117 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 02:30:27.652123 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 02:30:27.652132 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 02:30:27.652138 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 02:30:27.652143 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 02:30:27.652148 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 02:30:27.652153 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 02:30:27.652158 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 02:30:27.652165 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 02:30:27.652170 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 02:30:27.652175 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 02:30:27.652180 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 02:30:27.652185 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 02:30:27.652190 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 02:30:27.652195 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 02:30:27.652200 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 02:30:27.652205 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 02:30:27.652210 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 02:30:27.652216 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 02:30:27.652221 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 02:30:27.652226 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 02:30:27.652231 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 02:30:27.652236 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 02:30:27.652241 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 02:30:27.652246 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 02:30:27.652251 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 02:30:27.652256 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 02:30:27.652262 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 02:30:27.652267 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 02:30:27.652272 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 02:30:27.652277 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 02:30:27.652282 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 02:30:27.652287 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 02:30:27.652292 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 02:30:27.652297 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 02:30:27.652302 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 02:30:27.652307 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 02:30:27.652313 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 02:30:27.652318 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 02:30:27.652323 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 02:30:27.652328 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 02:30:27.652333 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 02:30:27.652338 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 02:30:27.652343 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 02:30:27.652348 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 02:30:27.652354 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 02:30:27.652359 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 02:30:27.652364 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 02:30:27.652369 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 02:30:27.652374 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 02:30:27.652379 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 02:30:27.652385 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 02:30:27.652390 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 02:30:27.652395 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 02:30:27.652400 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 02:30:27.652406 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 02:30:27.652411 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 02:30:27.652416 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 02:30:27.652421 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 02:30:27.652426 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 02:30:27.652431 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 02:30:27.652436 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 02:30:27.652441 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 02:30:27.652446 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 02:30:27.652451 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 02:30:27.652457 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 02:30:27.652462 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 02:30:27.652467 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 02:30:27.652472 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 02:30:27.652477 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 02:30:27.652482 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 02:30:27.652488 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 02:30:27.652493 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 02:30:27.652498 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 02:30:27.652503 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 02:30:27.652509 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 02:30:27.652514 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 02:30:27.652519 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 02:30:27.652524 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 02:30:27.652538 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 02:30:27.652544 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 02:30:27.652549 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 02:30:27.652554 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 02:30:27.652559 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 02:30:27.652584 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 02:30:27.652589 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 02:30:27.652594 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 02:30:27.652600 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 02:30:27.652621 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 02:30:27.652626 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 02:30:27.652631 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 02:30:27.652636 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 02:30:27.652641 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 02:30:27.652647 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 02:30:27.652652 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 02:30:27.652657 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 02:30:27.652662 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 02:30:27.652667 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 02:30:27.652672 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 02:30:27.652677 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 02:30:27.652682 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 02:30:27.652687 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 02:30:27.652692 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 02:30:27.652698 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 02:30:27.652704 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 02:30:27.652709 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 02:30:27.652714 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 02:30:27.652719 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 02:30:27.652724 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 02:30:27.652729 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 02:30:27.652734 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 02:30:27.652739 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 02:30:27.652745 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 02:30:27.652750 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 02:30:27.652755 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 02:30:27.652760 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:30:27.652765 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 02:30:27.652770 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:30:27.652776 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 02:30:27.652781 kernel: TSC deadline timer available Dec 13 02:30:27.652786 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 02:30:27.652791 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 02:30:27.652797 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 02:30:27.652802 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:30:27.652807 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 02:30:27.652812 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 02:30:27.652817 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 02:30:27.652823 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 02:30:27.652828 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 02:30:27.652833 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 02:30:27.652839 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 02:30:27.652844 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 02:30:27.652849 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 02:30:27.652854 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 02:30:27.652866 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 02:30:27.652872 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 02:30:27.652877 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 02:30:27.652882 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 02:30:27.652888 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 02:30:27.652894 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 02:30:27.652899 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 02:30:27.652905 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 02:30:27.652910 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 02:30:27.652915 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 02:30:27.652921 kernel: Policy zone: DMA32 Dec 13 02:30:27.652927 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:30:27.652933 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:30:27.652939 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 02:30:27.652945 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 02:30:27.652950 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 02:30:27.652956 kernel: printk: log_buf_len: 1048576 bytes Dec 13 02:30:27.652961 kernel: printk: early log buf free: 239728(91%) Dec 13 02:30:27.652967 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:30:27.652972 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:30:27.652978 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:30:27.652984 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 155976K reserved, 0K cma-reserved) Dec 13 02:30:27.652991 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 02:30:27.652996 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:30:27.653002 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:30:27.653008 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:30:27.653014 kernel: rcu: RCU event tracing is enabled. Dec 13 02:30:27.653020 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 02:30:27.653026 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:30:27.653031 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:30:27.653037 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:30:27.653042 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 02:30:27.653048 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 02:30:27.653053 kernel: random: crng init done Dec 13 02:30:27.653058 kernel: Console: colour VGA+ 80x25 Dec 13 02:30:27.653064 kernel: printk: console [tty0] enabled Dec 13 02:30:27.653069 kernel: printk: console [ttyS0] enabled Dec 13 02:30:27.653076 kernel: ACPI: Core revision 20210730 Dec 13 02:30:27.653081 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 02:30:27.653087 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:30:27.653092 kernel: x2apic enabled Dec 13 02:30:27.653098 kernel: Switched APIC routing to physical x2apic. Dec 13 02:30:27.653103 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 02:30:27.653109 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:30:27.653114 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 02:30:27.653120 kernel: Disabled fast string operations Dec 13 02:30:27.653126 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 02:30:27.653131 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 02:30:27.653137 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:30:27.653143 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 02:30:27.653148 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:30:27.653154 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:30:27.653159 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 02:30:27.653165 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:30:27.653171 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 02:30:27.653176 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 02:30:27.653182 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:30:27.653187 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:30:27.653193 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:30:27.653198 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 02:30:27.653204 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 02:30:27.653209 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:30:27.653215 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:30:27.653221 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:30:27.653227 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:30:27.653232 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 02:30:27.653238 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:30:27.653243 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 02:30:27.653249 kernel: LSM: Security Framework initializing Dec 13 02:30:27.653254 kernel: SELinux: Initializing. Dec 13 02:30:27.653260 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:30:27.653266 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:30:27.653272 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 02:30:27.653277 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 02:30:27.653283 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 02:30:27.653288 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 02:30:27.653294 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 02:30:27.653299 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 02:30:27.653304 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 02:30:27.653309 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 02:30:27.653315 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 02:30:27.653321 kernel: ... version: 1 Dec 13 02:30:27.653326 kernel: ... bit width: 48 Dec 13 02:30:27.653332 kernel: ... generic registers: 4 Dec 13 02:30:27.653337 kernel: ... value mask: 0000ffffffffffff Dec 13 02:30:27.653343 kernel: ... max period: 000000007fffffff Dec 13 02:30:27.653348 kernel: ... fixed-purpose events: 0 Dec 13 02:30:27.653353 kernel: ... event mask: 000000000000000f Dec 13 02:30:27.653360 kernel: signal: max sigframe size: 1776 Dec 13 02:30:27.653365 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:30:27.653372 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:30:27.653378 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:30:27.653383 kernel: x86: Booting SMP configuration: Dec 13 02:30:27.653388 kernel: .... node #0, CPUs: #1 Dec 13 02:30:27.653394 kernel: Disabled fast string operations Dec 13 02:30:27.653399 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 02:30:27.653405 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 02:30:27.653410 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:30:27.653415 kernel: smpboot: Max logical packages: 128 Dec 13 02:30:27.653421 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 02:30:27.653427 kernel: devtmpfs: initialized Dec 13 02:30:27.653433 kernel: x86/mm: Memory block size: 128MB Dec 13 02:30:27.653438 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 02:30:27.653444 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:30:27.653449 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 02:30:27.653455 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:30:27.653460 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:30:27.653466 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:30:27.653471 kernel: audit: type=2000 audit(1734057026.059:1): state=initialized audit_enabled=0 res=1 Dec 13 02:30:27.653478 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:30:27.653483 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:30:27.653488 kernel: cpuidle: using governor menu Dec 13 02:30:27.653494 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 02:30:27.653500 kernel: ACPI: bus type PCI registered Dec 13 02:30:27.653505 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:30:27.653510 kernel: dca service started, version 1.12.1 Dec 13 02:30:27.653516 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 02:30:27.653521 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 02:30:27.658539 kernel: PCI: Using configuration type 1 for base access Dec 13 02:30:27.658558 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:30:27.658565 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:30:27.658571 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:30:27.658577 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:30:27.658583 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:30:27.658588 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:30:27.658594 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:30:27.658599 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:30:27.658607 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:30:27.658613 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:30:27.658619 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 02:30:27.658624 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 02:30:27.658630 kernel: ACPI: Interpreter enabled Dec 13 02:30:27.658636 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 02:30:27.658641 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:30:27.658647 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:30:27.658653 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 02:30:27.658660 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 02:30:27.658736 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:30:27.658785 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 02:30:27.658830 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 02:30:27.658838 kernel: PCI host bridge to bus 0000:00 Dec 13 02:30:27.658884 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:30:27.658927 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 02:30:27.658967 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 02:30:27.659006 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 02:30:27.659045 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 02:30:27.659084 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 02:30:27.659126 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:30:27.659165 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 02:30:27.659211 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 02:30:27.659265 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 02:30:27.659315 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 02:30:27.659364 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 02:30:27.659414 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 02:30:27.659460 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 02:30:27.659505 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 02:30:27.659568 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 02:30:27.659620 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 02:30:27.659692 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 02:30:27.659777 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 02:30:27.659825 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 02:30:27.659897 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 02:30:27.659955 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 02:30:27.660014 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 02:30:27.660060 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 02:30:27.660109 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 02:30:27.660154 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 02:30:27.660198 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 02:30:27.660243 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 02:30:27.660290 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 02:30:27.660334 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:30:27.660382 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 02:30:27.660434 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.660480 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.660540 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.660598 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.660647 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.660693 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.660742 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.660787 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.660836 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.660884 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.660935 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.660980 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661029 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661074 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661122 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661168 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661219 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661266 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661314 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661360 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661408 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661455 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661503 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661561 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661610 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661655 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661707 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661754 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661802 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661848 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.661895 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.661951 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662014 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662090 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662165 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662213 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662262 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662308 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662356 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662401 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662453 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662498 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662569 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662617 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662671 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662717 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662769 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662816 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662867 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.662912 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.662960 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.663006 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.663057 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.663115 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.663178 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.663224 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.663325 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.663376 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.663425 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.663473 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.663524 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.663629 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.663679 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:30:27.663725 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.663773 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 02:30:27.663823 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:30:27.663869 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 02:30:27.663878 kernel: acpiphp: Slot [32] registered Dec 13 02:30:27.663885 kernel: acpiphp: Slot [33] registered Dec 13 02:30:27.663890 kernel: acpiphp: Slot [34] registered Dec 13 02:30:27.663896 kernel: acpiphp: Slot [35] registered Dec 13 02:30:27.663902 kernel: acpiphp: Slot [36] registered Dec 13 02:30:27.663907 kernel: acpiphp: Slot [37] registered Dec 13 02:30:27.663915 kernel: acpiphp: Slot [38] registered Dec 13 02:30:27.663921 kernel: acpiphp: Slot [39] registered Dec 13 02:30:27.663926 kernel: acpiphp: Slot [40] registered Dec 13 02:30:27.663932 kernel: acpiphp: Slot [41] registered Dec 13 02:30:27.663938 kernel: acpiphp: Slot [42] registered Dec 13 02:30:27.663943 kernel: acpiphp: Slot [43] registered Dec 13 02:30:27.663949 kernel: acpiphp: Slot [44] registered Dec 13 02:30:27.663955 kernel: acpiphp: Slot [45] registered Dec 13 02:30:27.663961 kernel: acpiphp: Slot [46] registered Dec 13 02:30:27.663967 kernel: acpiphp: Slot [47] registered Dec 13 02:30:27.663973 kernel: acpiphp: Slot [48] registered Dec 13 02:30:27.663979 kernel: acpiphp: Slot [49] registered Dec 13 02:30:27.663984 kernel: acpiphp: Slot [50] registered Dec 13 02:30:27.663990 kernel: acpiphp: Slot [51] registered Dec 13 02:30:27.663995 kernel: acpiphp: Slot [52] registered Dec 13 02:30:27.664001 kernel: acpiphp: Slot [53] registered Dec 13 02:30:27.664006 kernel: acpiphp: Slot [54] registered Dec 13 02:30:27.664012 kernel: acpiphp: Slot [55] registered Dec 13 02:30:27.664018 kernel: acpiphp: Slot [56] registered Dec 13 02:30:27.664024 kernel: acpiphp: Slot [57] registered Dec 13 02:30:27.664029 kernel: acpiphp: Slot [58] registered Dec 13 02:30:27.664035 kernel: acpiphp: Slot [59] registered Dec 13 02:30:27.664041 kernel: acpiphp: Slot [60] registered Dec 13 02:30:27.664046 kernel: acpiphp: Slot [61] registered Dec 13 02:30:27.664052 kernel: acpiphp: Slot [62] registered Dec 13 02:30:27.664057 kernel: acpiphp: Slot [63] registered Dec 13 02:30:27.664102 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 02:30:27.664158 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:30:27.664211 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:30:27.664257 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:30:27.664301 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 02:30:27.664346 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 02:30:27.664391 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 02:30:27.664434 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 02:30:27.664487 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 02:30:27.664569 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 02:30:27.664616 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 02:30:27.664661 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 02:30:27.664735 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 02:30:27.664793 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 02:30:27.664841 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 02:30:27.664893 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:30:27.664943 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 02:30:27.664990 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:30:27.665037 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:30:27.665084 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:30:27.665129 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:30:27.665176 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:30:27.665222 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:30:27.665267 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:30:27.665315 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:30:27.665361 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:30:27.665407 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:30:27.665452 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:30:27.665497 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:30:27.665551 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:30:27.665602 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:30:27.665651 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:30:27.665709 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:30:27.665754 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:30:27.665800 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:30:27.665846 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:30:27.665893 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:30:27.665938 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:30:27.665984 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:30:27.666030 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:30:27.666074 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:30:27.666120 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:30:27.666165 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:30:27.666209 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:30:27.666262 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 02:30:27.666310 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 02:30:27.666357 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 02:30:27.666403 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 02:30:27.666450 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 02:30:27.666496 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:30:27.675083 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 02:30:27.675148 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 02:30:27.675199 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:30:27.675248 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:30:27.675295 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:30:27.675340 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:30:27.675388 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:30:27.675434 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:30:27.675479 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:30:27.675526 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:30:27.675591 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:30:27.675636 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:30:27.675681 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:30:27.675727 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:30:27.675776 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:30:27.675822 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:30:27.675867 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:30:27.675917 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:30:27.675962 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:30:27.676007 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:30:27.676053 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:30:27.676098 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:30:27.676142 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:30:27.676189 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:30:27.676233 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:30:27.676281 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:30:27.676327 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:30:27.676372 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:30:27.676415 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:30:27.676461 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:30:27.676506 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:30:27.676563 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:30:27.676610 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:30:27.676659 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:30:27.676704 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:30:27.676748 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:30:27.676793 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:30:27.676840 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:30:27.676885 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:30:27.676930 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:30:27.676976 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:30:27.677024 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:30:27.677069 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:30:27.677121 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:30:27.677167 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:30:27.677212 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:30:27.677256 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:30:27.677302 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:30:27.677348 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:30:27.677395 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:30:27.677441 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:30:27.677485 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:30:27.682003 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:30:27.683737 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:30:27.683790 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:30:27.683838 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:30:27.683889 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:30:27.683935 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:30:27.683980 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:30:27.684024 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:30:27.684071 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:30:27.684116 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:30:27.684161 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:30:27.684206 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:30:27.684255 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:30:27.684300 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:30:27.684345 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:30:27.684405 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:30:27.684473 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:30:27.684519 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:30:27.684597 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:30:27.684663 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:30:27.684733 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:30:27.684781 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:30:27.684826 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:30:27.684871 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:30:27.684916 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:30:27.684961 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:30:27.685006 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:30:27.685055 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:30:27.685100 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:30:27.685145 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:30:27.685152 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 02:30:27.685159 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 02:30:27.685164 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 02:30:27.685170 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:30:27.685176 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 02:30:27.685182 kernel: iommu: Default domain type: Translated Dec 13 02:30:27.685189 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:30:27.685235 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 02:30:27.685279 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:30:27.685324 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 02:30:27.685332 kernel: vgaarb: loaded Dec 13 02:30:27.685338 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:30:27.685344 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:30:27.685350 kernel: PTP clock support registered Dec 13 02:30:27.685355 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:30:27.685363 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:30:27.685369 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 02:30:27.685375 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 02:30:27.685381 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 02:30:27.685387 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 02:30:27.685392 kernel: clocksource: Switched to clocksource tsc-early Dec 13 02:30:27.685398 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:30:27.685404 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:30:27.685410 kernel: pnp: PnP ACPI init Dec 13 02:30:27.685461 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 02:30:27.685505 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 02:30:27.685676 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 02:30:27.685725 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 02:30:27.685771 kernel: pnp 00:06: [dma 2] Dec 13 02:30:27.685815 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 02:30:27.685859 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 02:30:27.685900 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 02:30:27.685908 kernel: pnp: PnP ACPI: found 8 devices Dec 13 02:30:27.685914 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:30:27.685920 kernel: NET: Registered PF_INET protocol family Dec 13 02:30:27.685926 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:30:27.685932 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 02:30:27.685937 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:30:27.685943 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:30:27.685950 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 02:30:27.685956 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 02:30:27.685962 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:30:27.685968 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:30:27.685973 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:30:27.685979 kernel: NET: Registered PF_XDP protocol family Dec 13 02:30:27.686028 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 02:30:27.686077 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 02:30:27.686127 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 02:30:27.686174 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 02:30:27.686221 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 02:30:27.686268 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 02:30:27.686314 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 02:30:27.686360 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 02:30:27.686409 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 02:30:27.686455 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 02:30:27.686501 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 02:30:27.686577 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 02:30:27.686636 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 02:30:27.686686 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 02:30:27.686734 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 02:30:27.686809 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 02:30:27.686857 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 02:30:27.686904 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 02:30:27.686948 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 02:30:27.686996 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 02:30:27.687042 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 02:30:27.687088 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 02:30:27.687134 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 02:30:27.687179 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:30:27.687225 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:30:27.687273 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.687337 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.687385 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.687431 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.687476 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.687522 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.687589 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.689074 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.689139 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.689190 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.689548 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.689613 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.689663 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.689984 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690041 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690089 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690138 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690184 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690230 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690276 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690321 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690366 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690411 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690457 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690502 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690669 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690717 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690763 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690809 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690854 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690898 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.690943 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.690988 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691036 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691081 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691125 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691170 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691214 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691259 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691302 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691347 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691393 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691438 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691482 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691526 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691592 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691637 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691682 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691727 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691771 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691819 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691864 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691909 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.691953 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.691998 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692043 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.692087 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692132 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.692177 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692224 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.692269 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692313 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.692358 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692403 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.692448 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692507 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.692588 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692635 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.692680 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.692727 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.693066 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.693124 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.693174 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.694354 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.694409 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.694728 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.694784 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.694832 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.694906 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.695214 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.695568 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.695622 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.695672 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:30:27.695732 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:30:27.702416 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:30:27.702491 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 02:30:27.702555 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:30:27.702609 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:30:27.702655 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:30:27.702706 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 02:30:27.702754 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:30:27.702799 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:30:27.702846 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:30:27.702891 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:30:27.702938 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:30:27.702982 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:30:27.703030 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:30:27.703090 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:30:27.703150 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:30:27.703203 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:30:27.703263 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:30:27.703323 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:30:27.703369 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:30:27.703414 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:30:27.703459 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:30:27.703520 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:30:27.703595 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:30:27.703642 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:30:27.703688 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:30:27.703734 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:30:27.703779 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:30:27.703832 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:30:27.703878 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:30:27.703924 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:30:27.703971 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:30:27.704017 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:30:27.704062 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:30:27.704111 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 02:30:27.704158 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:30:27.704203 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:30:27.704250 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:30:27.704295 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:30:27.704343 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:30:27.704389 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:30:27.704435 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:30:27.704481 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:30:27.704527 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:30:27.704591 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:30:27.704638 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:30:27.704682 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:30:27.704732 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:30:27.705077 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:30:27.705132 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:30:27.705181 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:30:27.705508 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:30:27.705585 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:30:27.705659 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:30:27.705730 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:30:27.705807 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:30:27.705864 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:30:27.705916 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:30:27.705989 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:30:27.706043 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:30:27.706096 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:30:27.706143 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:30:27.706191 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:30:27.706241 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:30:27.706315 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:30:27.706382 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:30:27.706439 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:30:27.706486 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:30:27.706614 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:30:27.706667 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:30:27.706714 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:30:27.706759 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:30:27.706805 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:30:27.706849 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:30:27.706896 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:30:27.706957 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:30:27.707003 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:30:27.707050 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:30:27.707095 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:30:27.707140 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:30:27.707195 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:30:27.707242 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:30:27.707288 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:30:27.707335 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:30:27.707381 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:30:27.707441 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:30:27.707498 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:30:27.707553 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:30:27.707600 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:30:27.707646 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:30:27.707691 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:30:27.707737 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:30:27.707782 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:30:27.707829 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:30:27.707884 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:30:27.707931 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:30:27.707978 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:30:27.708025 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:30:27.708071 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:30:27.708115 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:30:27.708162 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:30:27.708233 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:30:27.708304 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:30:27.708382 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:30:27.708430 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:30:27.708476 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:30:27.708524 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:30:27.708596 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:30:27.708643 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:30:27.708692 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:30:27.708738 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:30:27.708790 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:30:27.708838 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:30:27.708887 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:30:27.708933 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:30:27.708981 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:30:27.709023 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:30:27.709068 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:30:27.709147 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:30:27.709200 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:30:27.709245 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:30:27.709286 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:30:27.709331 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:30:27.709402 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 02:30:27.709467 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 02:30:27.709522 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:30:27.709586 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:30:27.709629 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:30:27.709676 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:30:27.709746 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:30:27.709789 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:30:27.709830 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:30:27.709872 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:30:27.709928 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:30:27.709978 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 02:30:27.710024 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 02:30:27.710067 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:30:27.710114 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 02:30:27.711429 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 02:30:27.711483 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:30:27.711591 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 02:30:27.711647 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 02:30:27.711696 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:30:27.711743 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 02:30:27.711786 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:30:27.711834 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 02:30:27.711892 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:30:27.711961 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 02:30:27.712010 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:30:27.712062 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 02:30:27.712107 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:30:27.712393 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 02:30:27.712443 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:30:27.712502 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 02:30:27.712604 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 02:30:27.712876 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:30:27.712955 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 02:30:27.713289 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 02:30:27.713338 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:30:27.713394 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 02:30:27.713879 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 02:30:27.713931 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:30:27.713986 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 02:30:27.714030 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:30:27.714076 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 02:30:27.714125 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:30:27.714174 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 02:30:27.714218 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:30:27.714270 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 02:30:27.714313 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:30:27.714361 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 02:30:27.714407 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:30:27.714457 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 02:30:27.714502 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 02:30:27.714563 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:30:27.714631 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 02:30:27.714728 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 02:30:27.714776 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:30:27.714837 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 02:30:27.714880 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 02:30:27.714926 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:30:27.715125 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 02:30:27.715172 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:30:27.715218 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 02:30:27.715289 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:30:27.715719 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 02:30:27.715787 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:30:27.715842 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 02:30:27.715901 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:30:27.715949 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 02:30:27.715993 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:30:27.716040 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 02:30:27.716084 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 02:30:27.716126 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:30:27.716173 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 02:30:27.716216 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 02:30:27.716269 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:30:27.716319 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 02:30:27.716374 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:30:27.716437 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 02:30:27.716480 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:30:27.716527 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 02:30:27.716585 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:30:27.719300 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 02:30:27.720035 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:30:27.720097 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 02:30:27.722958 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:30:27.723015 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 02:30:27.723061 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:30:27.723115 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:30:27.723125 kernel: PCI: CLS 32 bytes, default 64 Dec 13 02:30:27.723134 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:30:27.723140 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:30:27.723146 kernel: clocksource: Switched to clocksource tsc Dec 13 02:30:27.723153 kernel: Initialise system trusted keyrings Dec 13 02:30:27.723159 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 02:30:27.723165 kernel: Key type asymmetric registered Dec 13 02:30:27.723171 kernel: Asymmetric key parser 'x509' registered Dec 13 02:30:27.723177 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:30:27.723183 kernel: io scheduler mq-deadline registered Dec 13 02:30:27.723191 kernel: io scheduler kyber registered Dec 13 02:30:27.723197 kernel: io scheduler bfq registered Dec 13 02:30:27.723249 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 02:30:27.723296 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.723344 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 02:30:27.723392 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.723439 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 02:30:27.723484 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.723553 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 02:30:27.723614 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.723662 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 02:30:27.723708 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.723755 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 02:30:27.723801 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.723850 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 02:30:27.723897 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.723944 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 02:30:27.723990 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.724036 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 02:30:27.724084 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.724131 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 02:30:27.724363 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.724416 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 02:30:27.724463 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725116 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 02:30:27.725171 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725224 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 02:30:27.725272 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725319 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 02:30:27.725365 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725412 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 02:30:27.725460 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725506 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 02:30:27.725560 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725608 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 02:30:27.725654 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725701 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 02:30:27.725757 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725805 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 02:30:27.725851 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725896 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 02:30:27.725942 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.725989 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 02:30:27.726313 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.726365 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 02:30:27.726414 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.726461 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 02:30:27.726508 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.726580 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 02:30:27.726630 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.726677 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 02:30:27.726722 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.726769 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 02:30:27.726814 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.726860 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 02:30:27.726908 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.726954 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 02:30:27.726999 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.727044 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 02:30:27.727089 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.727137 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 02:30:27.727182 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.727229 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 02:30:27.727274 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.727320 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 02:30:27.727365 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:30:27.727376 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:30:27.727382 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:30:27.727389 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:30:27.727395 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 02:30:27.727401 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:30:27.727407 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:30:27.727455 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 02:30:27.727498 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T02:30:27 UTC (1734057027) Dec 13 02:30:27.727508 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:30:27.727565 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 02:30:27.727576 kernel: fail to initialize ptp_kvm Dec 13 02:30:27.727582 kernel: intel_pstate: CPU model not supported Dec 13 02:30:27.727588 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:30:27.727594 kernel: Segment Routing with IPv6 Dec 13 02:30:27.727600 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:30:27.727607 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:30:27.727615 kernel: Key type dns_resolver registered Dec 13 02:30:27.727621 kernel: IPI shorthand broadcast: enabled Dec 13 02:30:27.727627 kernel: sched_clock: Marking stable (869237679, 221489943)->(1158620781, -67893159) Dec 13 02:30:27.727633 kernel: registered taskstats version 1 Dec 13 02:30:27.727639 kernel: Loading compiled-in X.509 certificates Dec 13 02:30:27.727646 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:30:27.727652 kernel: Key type .fscrypt registered Dec 13 02:30:27.727658 kernel: Key type fscrypt-provisioning registered Dec 13 02:30:27.727664 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:30:27.727671 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:30:27.727677 kernel: ima: No architecture policies found Dec 13 02:30:27.727683 kernel: clk: Disabling unused clocks Dec 13 02:30:27.727689 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:30:27.727695 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:30:27.727702 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:30:27.727708 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:30:27.727717 kernel: Run /init as init process Dec 13 02:30:27.727727 kernel: with arguments: Dec 13 02:30:27.727740 kernel: /init Dec 13 02:30:27.727753 kernel: with environment: Dec 13 02:30:27.727761 kernel: HOME=/ Dec 13 02:30:27.727767 kernel: TERM=linux Dec 13 02:30:27.727773 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:30:27.727780 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:30:27.727789 systemd[1]: Detected virtualization vmware. Dec 13 02:30:27.727795 systemd[1]: Detected architecture x86-64. Dec 13 02:30:27.727803 systemd[1]: Running in initrd. Dec 13 02:30:27.727809 systemd[1]: No hostname configured, using default hostname. Dec 13 02:30:27.727815 systemd[1]: Hostname set to . Dec 13 02:30:27.727822 systemd[1]: Initializing machine ID from random generator. Dec 13 02:30:27.727828 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:30:27.727834 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:30:27.727841 systemd[1]: Reached target cryptsetup.target. Dec 13 02:30:27.727847 systemd[1]: Reached target paths.target. Dec 13 02:30:27.727855 systemd[1]: Reached target slices.target. Dec 13 02:30:27.727861 systemd[1]: Reached target swap.target. Dec 13 02:30:27.727867 systemd[1]: Reached target timers.target. Dec 13 02:30:27.727874 systemd[1]: Listening on iscsid.socket. Dec 13 02:30:27.727880 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:30:27.727886 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:30:27.727892 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:30:27.727899 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:30:27.727906 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:30:27.727912 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:30:27.727918 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:30:27.727925 systemd[1]: Reached target sockets.target. Dec 13 02:30:27.727931 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:30:27.727938 systemd[1]: Finished network-cleanup.service. Dec 13 02:30:27.727944 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:30:27.727951 systemd[1]: Starting systemd-journald.service... Dec 13 02:30:27.727957 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:30:27.727964 systemd[1]: Starting systemd-resolved.service... Dec 13 02:30:27.727970 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:30:27.727977 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:30:27.727983 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:30:27.727989 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:30:27.727996 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:30:27.728002 kernel: audit: type=1130 audit(1734057027.666:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.728008 systemd[1]: Started systemd-resolved.service. Dec 13 02:30:27.728016 kernel: audit: type=1130 audit(1734057027.670:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.728022 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:30:27.728029 kernel: audit: type=1130 audit(1734057027.676:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.728036 systemd[1]: Reached target nss-lookup.target. Dec 13 02:30:27.728042 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:30:27.728049 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:30:27.728055 kernel: Bridge firewalling registered Dec 13 02:30:27.728060 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:30:27.728068 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:30:27.728075 kernel: audit: type=1130 audit(1734057027.695:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.728081 kernel: SCSI subsystem initialized Dec 13 02:30:27.728087 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:30:27.728094 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:30:27.728100 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:30:27.728107 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:30:27.728113 kernel: audit: type=1130 audit(1734057027.715:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.728119 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:30:27.728126 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:30:27.728133 kernel: audit: type=1130 audit(1734057027.724:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.728142 systemd-journald[216]: Journal started Dec 13 02:30:27.728173 systemd-journald[216]: Runtime Journal (/run/log/journal/c3bd6addebe140b7a3cc9b7c405fa1ed) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:30:27.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.652139 systemd-modules-load[217]: Inserted module 'overlay' Dec 13 02:30:27.659817 systemd-resolved[218]: Positive Trust Anchors: Dec 13 02:30:27.730032 systemd[1]: Started systemd-journald.service. Dec 13 02:30:27.659824 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:30:27.659843 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:30:27.733652 kernel: audit: type=1130 audit(1734057027.729:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.661415 systemd-resolved[218]: Defaulting to hostname 'linux'. Dec 13 02:30:27.687330 systemd-modules-load[217]: Inserted module 'br_netfilter' Dec 13 02:30:27.715360 systemd-modules-load[217]: Inserted module 'dm_multipath' Dec 13 02:30:27.735264 dracut-cmdline[233]: dracut-dracut-053 Dec 13 02:30:27.735264 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 02:30:27.735264 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:30:27.759547 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:30:27.770546 kernel: iscsi: registered transport (tcp) Dec 13 02:30:27.785688 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:30:27.785737 kernel: QLogic iSCSI HBA Driver Dec 13 02:30:27.802797 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:30:27.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.803432 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:30:27.806546 kernel: audit: type=1130 audit(1734057027.801:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:27.840589 kernel: raid6: avx2x4 gen() 47311 MB/s Dec 13 02:30:27.857576 kernel: raid6: avx2x4 xor() 17947 MB/s Dec 13 02:30:27.874555 kernel: raid6: avx2x2 gen() 51096 MB/s Dec 13 02:30:27.891555 kernel: raid6: avx2x2 xor() 31536 MB/s Dec 13 02:30:27.908549 kernel: raid6: avx2x1 gen() 43853 MB/s Dec 13 02:30:27.925546 kernel: raid6: avx2x1 xor() 27750 MB/s Dec 13 02:30:27.942550 kernel: raid6: sse2x4 gen() 21187 MB/s Dec 13 02:30:27.959555 kernel: raid6: sse2x4 xor() 11877 MB/s Dec 13 02:30:27.976547 kernel: raid6: sse2x2 gen() 21515 MB/s Dec 13 02:30:27.993549 kernel: raid6: sse2x2 xor() 13243 MB/s Dec 13 02:30:28.010555 kernel: raid6: sse2x1 gen() 17771 MB/s Dec 13 02:30:28.027742 kernel: raid6: sse2x1 xor() 8869 MB/s Dec 13 02:30:28.027782 kernel: raid6: using algorithm avx2x2 gen() 51096 MB/s Dec 13 02:30:28.027789 kernel: raid6: .... xor() 31536 MB/s, rmw enabled Dec 13 02:30:28.028927 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:30:28.037542 kernel: xor: automatically using best checksumming function avx Dec 13 02:30:28.100009 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:30:28.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:28.104196 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:30:28.103000 audit: BPF prog-id=7 op=LOAD Dec 13 02:30:28.103000 audit: BPF prog-id=8 op=LOAD Dec 13 02:30:28.104830 systemd[1]: Starting systemd-udevd.service... Dec 13 02:30:28.107624 kernel: audit: type=1130 audit(1734057028.102:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:28.115518 systemd-udevd[416]: Using default interface naming scheme 'v252'. Dec 13 02:30:28.118421 systemd[1]: Started systemd-udevd.service. Dec 13 02:30:28.118981 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:30:28.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:28.125886 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Dec 13 02:30:28.141555 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:30:28.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:28.142109 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:30:28.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:28.203986 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:30:28.256541 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 02:30:28.258783 kernel: vmw_pvscsi: using 64bit dma Dec 13 02:30:28.258810 kernel: vmw_pvscsi: max_id: 16 Dec 13 02:30:28.258818 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 02:30:28.264545 kernel: libata version 3.00 loaded. Dec 13 02:30:28.266544 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 02:30:28.284765 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 02:30:28.284778 kernel: scsi host1: ata_piix Dec 13 02:30:28.284849 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 02:30:28.287809 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 02:30:28.287820 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 02:30:28.287827 kernel: vmw_pvscsi: using MSI-X Dec 13 02:30:28.287834 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 02:30:28.287909 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 02:30:28.287966 kernel: scsi host2: ata_piix Dec 13 02:30:28.288027 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 02:30:28.288041 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 02:30:28.288048 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 02:30:28.288101 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 02:30:28.295548 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:30:28.448545 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 02:30:28.452541 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 02:30:28.457542 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 02:30:28.463863 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:30:28.463898 kernel: AES CTR mode by8 optimization enabled Dec 13 02:30:28.470645 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 02:30:28.486106 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 02:30:28.486185 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 02:30:28.486244 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 02:30:28.486345 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 02:30:28.486402 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:30:28.486415 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 02:30:28.508546 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 02:30:28.528566 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 02:30:28.528581 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (472) Dec 13 02:30:28.528589 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 02:30:28.523216 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:30:28.526072 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:30:28.526201 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:30:28.526784 systemd[1]: Starting disk-uuid.service... Dec 13 02:30:28.531768 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:30:28.549266 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:30:28.558553 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:30:28.567551 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:30:29.597553 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:30:29.597788 disk-uuid[549]: The operation has completed successfully. Dec 13 02:30:29.631409 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:30:29.631707 systemd[1]: Finished disk-uuid.service. Dec 13 02:30:29.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:29.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:29.634287 systemd[1]: Starting verity-setup.service... Dec 13 02:30:29.648546 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:30:29.698895 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:30:29.699358 systemd[1]: Finished verity-setup.service. Dec 13 02:30:29.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:29.700387 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:30:29.777625 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:30:29.777872 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:30:29.778480 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 02:30:29.778969 systemd[1]: Starting ignition-setup.service... Dec 13 02:30:29.889211 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:30:29.889257 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:30:29.889274 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:30:29.894547 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:30:29.900450 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:30:29.904990 systemd[1]: Finished ignition-setup.service. Dec 13 02:30:29.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:29.906377 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:30:29.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:29.956651 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 02:30:29.957256 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:30:30.006849 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:30:30.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.005000 audit: BPF prog-id=9 op=LOAD Dec 13 02:30:30.007751 systemd[1]: Starting systemd-networkd.service... Dec 13 02:30:30.022584 systemd-networkd[735]: lo: Link UP Dec 13 02:30:30.022818 systemd-networkd[735]: lo: Gained carrier Dec 13 02:30:30.023214 systemd-networkd[735]: Enumeration completed Dec 13 02:30:30.023390 systemd[1]: Started systemd-networkd.service. Dec 13 02:30:30.023573 systemd[1]: Reached target network.target. Dec 13 02:30:30.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.023897 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 02:30:30.024155 systemd[1]: Starting iscsiuio.service... Dec 13 02:30:30.028222 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:30:30.028353 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:30:30.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.027769 systemd[1]: Started iscsiuio.service. Dec 13 02:30:30.028854 systemd[1]: Starting iscsid.service... Dec 13 02:30:30.029114 systemd-networkd[735]: ens192: Link UP Dec 13 02:30:30.029231 systemd-networkd[735]: ens192: Gained carrier Dec 13 02:30:30.031176 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:30:30.031176 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:30:30.031176 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:30:30.031176 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:30:30.031176 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:30:30.031176 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:30:30.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.031979 systemd[1]: Started iscsid.service. Dec 13 02:30:30.032698 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:30:30.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.039857 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:30:30.040059 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:30:30.040167 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:30:30.040263 systemd[1]: Reached target remote-fs.target. Dec 13 02:30:30.040783 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:30:30.046655 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:30:30.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.368294 systemd-resolved[218]: Detected conflict on linux IN A 139.178.70.100 Dec 13 02:30:30.368303 systemd-resolved[218]: Hostname conflict, changing published hostname from 'linux' to 'linux7'. Dec 13 02:30:30.423005 ignition[607]: Ignition 2.14.0 Dec 13 02:30:30.423013 ignition[607]: Stage: fetch-offline Dec 13 02:30:30.423049 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:30:30.423063 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:30:30.463899 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:30:30.464224 ignition[607]: parsed url from cmdline: "" Dec 13 02:30:30.464274 ignition[607]: no config URL provided Dec 13 02:30:30.464414 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:30:30.464423 ignition[607]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:30:30.464889 ignition[607]: config successfully fetched Dec 13 02:30:30.464900 ignition[607]: parsing config with SHA512: 9efafe23879571ce53368a66a593a8482aa95c3ddf1ca042f2d9e62d1f5a520ea832ebfc5304ef74c1296fc1c2cd33095bc430c39506ae31b2ea5eb37192339c Dec 13 02:30:30.493896 unknown[607]: fetched base config from "system" Dec 13 02:30:30.494089 unknown[607]: fetched user config from "vmware" Dec 13 02:30:30.494484 ignition[607]: fetch-offline: fetch-offline passed Dec 13 02:30:30.494661 ignition[607]: Ignition finished successfully Dec 13 02:30:30.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.495309 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:30:30.495451 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:30:30.495973 systemd[1]: Starting ignition-kargs.service... Dec 13 02:30:30.501266 ignition[755]: Ignition 2.14.0 Dec 13 02:30:30.501274 ignition[755]: Stage: kargs Dec 13 02:30:30.501344 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:30:30.501354 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:30:30.502667 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:30:30.504012 ignition[755]: kargs: kargs passed Dec 13 02:30:30.504046 ignition[755]: Ignition finished successfully Dec 13 02:30:30.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.505169 systemd[1]: Finished ignition-kargs.service. Dec 13 02:30:30.505765 systemd[1]: Starting ignition-disks.service... Dec 13 02:30:30.510078 ignition[761]: Ignition 2.14.0 Dec 13 02:30:30.510313 ignition[761]: Stage: disks Dec 13 02:30:30.510492 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:30:30.510728 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:30:30.512024 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:30:30.513344 ignition[761]: disks: disks passed Dec 13 02:30:30.513381 ignition[761]: Ignition finished successfully Dec 13 02:30:30.513994 systemd[1]: Finished ignition-disks.service. Dec 13 02:30:30.514148 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:30:30.514240 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:30:30.514325 systemd[1]: Reached target local-fs.target. Dec 13 02:30:30.514406 systemd[1]: Reached target sysinit.target. Dec 13 02:30:30.514484 systemd[1]: Reached target basic.target. Dec 13 02:30:30.515058 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:30:30.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.710629 systemd-fsck[769]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:30:30.721081 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:30:30.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:30.721665 systemd[1]: Mounting sysroot.mount... Dec 13 02:30:30.875545 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:30:30.876221 systemd[1]: Mounted sysroot.mount. Dec 13 02:30:30.876374 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:30:30.890738 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:30:30.891099 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:30:30.891123 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:30:30.891138 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:30:30.892526 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:30:30.910504 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:30:30.911187 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:30:30.918135 initrd-setup-root[780]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:30:30.937482 initrd-setup-root[788]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:30:30.942124 initrd-setup-root[796]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:30:30.951105 initrd-setup-root[804]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:30:31.003665 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (775) Dec 13 02:30:31.014164 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:30:31.014196 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:30:31.014205 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:30:31.058551 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:30:31.069134 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:30:31.088136 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:30:31.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:31.088841 systemd[1]: Starting ignition-mount.service... Dec 13 02:30:31.089460 systemd[1]: Starting sysroot-boot.service... Dec 13 02:30:31.094179 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:30:31.094550 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:30:31.102398 ignition[840]: INFO : Ignition 2.14.0 Dec 13 02:30:31.102398 ignition[840]: INFO : Stage: mount Dec 13 02:30:31.102871 ignition[840]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:30:31.102871 ignition[840]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:30:31.104497 ignition[840]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:30:31.106255 ignition[840]: INFO : mount: mount passed Dec 13 02:30:31.106436 ignition[840]: INFO : Ignition finished successfully Dec 13 02:30:31.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:31.107184 systemd[1]: Finished ignition-mount.service. Dec 13 02:30:31.107935 systemd[1]: Starting ignition-files.service... Dec 13 02:30:31.114759 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:30:31.120762 systemd[1]: Finished sysroot-boot.service. Dec 13 02:30:31.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:31.125168 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (848) Dec 13 02:30:31.125202 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:30:31.125210 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:30:31.125815 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:30:31.133549 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:30:31.137324 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:30:31.142638 ignition[869]: INFO : Ignition 2.14.0 Dec 13 02:30:31.142888 ignition[869]: INFO : Stage: files Dec 13 02:30:31.143071 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:30:31.143223 ignition[869]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:30:31.144754 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:30:31.148200 ignition[869]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:30:31.148839 ignition[869]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:30:31.148839 ignition[869]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:30:31.151658 ignition[869]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:30:31.151917 ignition[869]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:30:31.153697 unknown[869]: wrote ssh authorized keys file for user: core Dec 13 02:30:31.153914 ignition[869]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:30:31.155140 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:30:31.155306 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:30:31.155463 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:30:31.155636 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:30:31.155636 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:30:31.155636 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:30:31.156186 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:30:31.156186 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:30:31.159709 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2125165809" Dec 13 02:30:31.161194 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (871) Dec 13 02:30:31.161209 ignition[869]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2125165809": device or resource busy Dec 13 02:30:31.161209 ignition[869]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2125165809", trying btrfs: device or resource busy Dec 13 02:30:31.161209 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2125165809" Dec 13 02:30:31.161209 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2125165809" Dec 13 02:30:31.162003 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2125165809" Dec 13 02:30:31.162003 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2125165809" Dec 13 02:30:31.162003 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:30:31.162003 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:30:31.162003 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 02:30:31.543408 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 02:30:31.737665 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:30:31.750773 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:30:31.750977 ignition[869]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:30:31.750977 ignition[869]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:30:31.757709 systemd-networkd[735]: ens192: Gained IPv6LL Dec 13 02:30:32.333069 ignition[869]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:30:32.333440 ignition[869]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:30:32.333440 ignition[869]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:30:32.333440 ignition[869]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:30:32.333440 ignition[869]: INFO : files: files passed Dec 13 02:30:32.333440 ignition[869]: INFO : Ignition finished successfully Dec 13 02:30:32.334803 systemd[1]: Finished ignition-files.service. Dec 13 02:30:32.338136 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 02:30:32.338174 kernel: audit: type=1130 audit(1734057032.333:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.336085 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:30:32.338878 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:30:32.339459 systemd[1]: Starting ignition-quench.service... Dec 13 02:30:32.342298 initrd-setup-root-after-ignition[895]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:30:32.342611 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:30:32.342664 systemd[1]: Finished ignition-quench.service. Dec 13 02:30:32.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.345429 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:30:32.348244 kernel: audit: type=1130 audit(1734057032.341:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.348259 kernel: audit: type=1131 audit(1734057032.341:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.348208 systemd[1]: Reached target ignition-complete.target. Dec 13 02:30:32.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.348765 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:30:32.351826 kernel: audit: type=1130 audit(1734057032.346:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.358736 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:30:32.358819 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:30:32.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.359105 systemd[1]: Reached target initrd-fs.target. Dec 13 02:30:32.364356 kernel: audit: type=1130 audit(1734057032.357:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.364372 kernel: audit: type=1131 audit(1734057032.357:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.364281 systemd[1]: Reached target initrd.target. Dec 13 02:30:32.364432 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:30:32.365072 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:30:32.372456 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:30:32.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.373509 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:30:32.375663 kernel: audit: type=1130 audit(1734057032.371:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.380961 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:30:32.381018 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:30:32.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.381577 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:30:32.386023 kernel: audit: type=1130 audit(1734057032.379:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.386041 kernel: audit: type=1131 audit(1734057032.379:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.386157 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:30:32.386388 systemd[1]: Stopped target timers.target. Dec 13 02:30:32.386618 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:30:32.386770 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:30:32.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.387050 systemd[1]: Stopped target initrd.target. Dec 13 02:30:32.389480 systemd[1]: Stopped target basic.target. Dec 13 02:30:32.389617 kernel: audit: type=1131 audit(1734057032.385:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.389748 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:30:32.389960 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:30:32.390167 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:30:32.390379 systemd[1]: Stopped target remote-fs.target. Dec 13 02:30:32.390589 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:30:32.390804 systemd[1]: Stopped target sysinit.target. Dec 13 02:30:32.391003 systemd[1]: Stopped target local-fs.target. Dec 13 02:30:32.391199 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:30:32.391402 systemd[1]: Stopped target swap.target. Dec 13 02:30:32.391613 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:30:32.391768 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:30:32.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.392031 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:30:32.392238 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:30:32.392386 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:30:32.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.392665 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:30:32.392822 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:30:32.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.393112 systemd[1]: Stopped target paths.target. Dec 13 02:30:32.393310 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:30:32.396640 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:30:32.396861 systemd[1]: Stopped target slices.target. Dec 13 02:30:32.397058 systemd[1]: Stopped target sockets.target. Dec 13 02:30:32.397268 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:30:32.397408 systemd[1]: Closed iscsid.socket. Dec 13 02:30:32.397617 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:30:32.397755 systemd[1]: Closed iscsiuio.socket. Dec 13 02:30:32.397968 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:30:32.398130 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:30:32.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.398408 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:30:32.398566 systemd[1]: Stopped ignition-files.service. Dec 13 02:30:32.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.399218 systemd[1]: Stopping ignition-mount.service... Dec 13 02:30:32.400029 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:30:32.400265 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:30:32.400429 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:30:32.400709 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:30:32.400865 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:30:32.405163 ignition[908]: INFO : Ignition 2.14.0 Dec 13 02:30:32.405163 ignition[908]: INFO : Stage: umount Dec 13 02:30:32.405163 ignition[908]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:30:32.405163 ignition[908]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:30:32.405806 ignition[908]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:30:32.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.406995 ignition[908]: INFO : umount: umount passed Dec 13 02:30:32.406995 ignition[908]: INFO : Ignition finished successfully Dec 13 02:30:32.407350 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:30:32.407418 systemd[1]: Stopped ignition-mount.service. Dec 13 02:30:32.407636 systemd[1]: Stopped target network.target. Dec 13 02:30:32.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.407740 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:30:32.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.407764 systemd[1]: Stopped ignition-disks.service. Dec 13 02:30:32.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.407907 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:30:32.407927 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:30:32.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.408083 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:30:32.408102 systemd[1]: Stopped ignition-setup.service. Dec 13 02:30:32.408303 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:30:32.408500 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:30:32.413236 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:30:32.413309 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:30:32.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.414498 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:30:32.414588 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:30:32.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.415079 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:30:32.415102 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:30:32.415699 systemd[1]: Stopping network-cleanup.service... Dec 13 02:30:32.415802 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:30:32.415830 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:30:32.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.415966 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 02:30:32.417000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:30:32.417000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:30:32.415988 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 02:30:32.416095 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:30:32.416118 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:30:32.416260 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:30:32.416281 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:30:32.418084 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:30:32.419611 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:30:32.419894 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:30:32.419980 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:30:32.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.420653 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:30:32.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.420679 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:30:32.420792 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:30:32.420808 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:30:32.420902 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:30:32.420923 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:30:32.421033 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:30:32.421052 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:30:32.421153 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:30:32.421173 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:30:32.422161 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:30:32.424661 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:30:32.424691 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:30:32.424864 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:30:32.424886 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:30:32.424987 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:30:32.425006 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:30:32.425646 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:30:32.425869 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:30:32.425926 systemd[1]: Stopped network-cleanup.service. Dec 13 02:30:32.426109 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:30:32.426154 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:30:32.443694 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:30:32.639205 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:30:32.639264 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:30:32.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.639546 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:30:32.639652 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:30:32.639676 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:30:32.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:32.640233 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:30:32.646761 systemd[1]: Switching root. Dec 13 02:30:32.662713 iscsid[740]: iscsid shutting down. Dec 13 02:30:32.662902 systemd-journald[216]: Journal stopped Dec 13 02:30:35.663960 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Dec 13 02:30:35.663980 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:30:35.663988 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:30:35.663994 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:30:35.663999 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:30:35.664006 kernel: SELinux: policy capability open_perms=1 Dec 13 02:30:35.664013 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:30:35.664019 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:30:35.664024 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:30:35.664029 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:30:35.664035 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:30:35.664040 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:30:35.664048 systemd[1]: Successfully loaded SELinux policy in 120.688ms. Dec 13 02:30:35.664055 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.348ms. Dec 13 02:30:35.664063 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:30:35.664071 systemd[1]: Detected virtualization vmware. Dec 13 02:30:35.664078 systemd[1]: Detected architecture x86-64. Dec 13 02:30:35.664084 systemd[1]: Detected first boot. Dec 13 02:30:35.664091 systemd[1]: Initializing machine ID from random generator. Dec 13 02:30:35.664097 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:30:35.664103 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:30:35.664110 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:30:35.664117 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:30:35.664124 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:30:35.664132 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:30:35.664138 systemd[1]: Stopped iscsiuio.service. Dec 13 02:30:35.664144 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:30:35.664151 systemd[1]: Stopped iscsid.service. Dec 13 02:30:35.664158 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:30:35.664164 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:30:35.664182 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:30:35.664191 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:30:35.664197 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:30:35.664204 systemd[1]: Created slice system-getty.slice. Dec 13 02:30:35.664210 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:30:35.664216 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:30:35.664224 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:30:35.664231 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:30:35.664237 systemd[1]: Created slice user.slice. Dec 13 02:30:35.664245 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:30:35.664253 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:30:35.664260 systemd[1]: Set up automount boot.automount. Dec 13 02:30:35.664267 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:30:35.664274 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:30:35.664280 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:30:35.664287 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:30:35.664294 systemd[1]: Reached target integritysetup.target. Dec 13 02:30:35.664300 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:30:35.664308 systemd[1]: Reached target remote-fs.target. Dec 13 02:30:35.664315 systemd[1]: Reached target slices.target. Dec 13 02:30:35.664321 systemd[1]: Reached target swap.target. Dec 13 02:30:35.664328 systemd[1]: Reached target torcx.target. Dec 13 02:30:35.664334 systemd[1]: Reached target veritysetup.target. Dec 13 02:30:35.664341 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:30:35.664349 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:30:35.664356 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:30:35.664363 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:30:35.664370 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:30:35.664377 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:30:35.664384 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:30:35.664391 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:30:35.664399 systemd[1]: Mounting media.mount... Dec 13 02:30:35.664406 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:30:35.664412 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:30:35.664419 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:30:35.664426 systemd[1]: Mounting tmp.mount... Dec 13 02:30:35.664433 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:30:35.664439 systemd[1]: Starting ignition-delete-config.service... Dec 13 02:30:35.664446 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:30:35.664453 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:30:35.664460 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:30:35.664467 systemd[1]: Starting modprobe@drm.service... Dec 13 02:30:35.664474 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:30:35.664481 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:30:35.664487 systemd[1]: Starting modprobe@loop.service... Dec 13 02:30:35.664494 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:30:35.664501 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:30:35.664508 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:30:35.664515 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:30:35.664523 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:30:35.664864 systemd[1]: Stopped systemd-journald.service. Dec 13 02:30:35.664877 systemd[1]: Starting systemd-journald.service... Dec 13 02:30:35.664884 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:30:35.664891 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:30:35.664898 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:30:35.664905 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:30:35.664912 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:30:35.664919 systemd[1]: Stopped verity-setup.service. Dec 13 02:30:35.664928 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:30:35.664935 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:30:35.664942 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:30:35.664949 systemd[1]: Mounted media.mount. Dec 13 02:30:35.664956 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:30:35.664963 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:30:35.664969 systemd[1]: Mounted tmp.mount. Dec 13 02:30:35.664976 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:30:35.664983 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:30:35.664991 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:30:35.664998 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:30:35.665005 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:30:35.665014 systemd-journald[1040]: Journal started Dec 13 02:30:35.665043 systemd-journald[1040]: Runtime Journal (/run/log/journal/5f3f076852a04ef7a091269e01317ce0) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:30:33.094000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:30:35.667611 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:30:35.667626 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:30:33.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:30:33.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:30:33.274000 audit: BPF prog-id=10 op=LOAD Dec 13 02:30:33.274000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:30:33.274000 audit: BPF prog-id=11 op=LOAD Dec 13 02:30:33.274000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:30:33.473000 audit[941]: AVC avc: denied { associate } for pid=941 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:30:33.473000 audit[941]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=924 pid=941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:33.473000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:30:33.475000 audit[941]: AVC avc: denied { associate } for pid=941 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:30:33.475000 audit[941]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=924 pid=941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:33.475000 audit: CWD cwd="/" Dec 13 02:30:33.475000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:33.475000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:33.475000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:30:35.557000 audit: BPF prog-id=12 op=LOAD Dec 13 02:30:35.557000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:30:35.557000 audit: BPF prog-id=13 op=LOAD Dec 13 02:30:35.557000 audit: BPF prog-id=14 op=LOAD Dec 13 02:30:35.557000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:30:35.557000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:30:35.559000 audit: BPF prog-id=15 op=LOAD Dec 13 02:30:35.559000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:30:35.559000 audit: BPF prog-id=16 op=LOAD Dec 13 02:30:35.559000 audit: BPF prog-id=17 op=LOAD Dec 13 02:30:35.559000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:30:35.559000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:30:35.559000 audit: BPF prog-id=18 op=LOAD Dec 13 02:30:35.559000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:30:35.559000 audit: BPF prog-id=19 op=LOAD Dec 13 02:30:35.559000 audit: BPF prog-id=20 op=LOAD Dec 13 02:30:35.559000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:30:35.559000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:30:35.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.567000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:30:35.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.634000 audit: BPF prog-id=21 op=LOAD Dec 13 02:30:35.634000 audit: BPF prog-id=22 op=LOAD Dec 13 02:30:35.634000 audit: BPF prog-id=23 op=LOAD Dec 13 02:30:35.634000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:30:35.634000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:30:35.668855 systemd[1]: Started systemd-journald.service. Dec 13 02:30:35.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.660000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:30:35.660000 audit[1040]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdccd45940 a2=4000 a3=7ffdccd459dc items=0 ppid=1 pid=1040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:35.660000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:30:35.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:33.471644 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:30:35.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.557712 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:30:33.472401 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:30:35.561804 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:30:33.472415 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:30:35.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.669968 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:30:33.472438 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:30:33.472444 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:30:33.472467 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:30:35.670197 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:30:35.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:33.472475 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:30:33.472617 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:30:33.472641 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:30:35.670475 jq[1007]: true Dec 13 02:30:35.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:33.472650 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:30:35.670463 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:30:33.473537 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:30:35.671232 systemd[1]: Reached target network-pre.target. Dec 13 02:30:33.473564 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:30:35.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.692546 systemd-journald[1040]: Time spent on flushing to /var/log/journal/5f3f076852a04ef7a091269e01317ce0 is 39.211ms for 1976 entries. Dec 13 02:30:35.692546 systemd-journald[1040]: System Journal (/var/log/journal/5f3f076852a04ef7a091269e01317ce0) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:30:35.745105 systemd-journald[1040]: Received client request to flush runtime journal. Dec 13 02:30:35.745135 kernel: loop: module loaded Dec 13 02:30:35.745149 kernel: fuse: init (API version 7.34) Dec 13 02:30:35.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:33.473598 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:30:35.674229 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:30:33.473608 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:30:35.674327 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:30:33.473619 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:30:35.676859 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:30:33.473626 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:30:35.677630 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:30:35.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.368233 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:30:35.677754 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:30:35.368384 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:30:35.678390 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:30:35.368445 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:30:35.679100 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:30:35.746072 jq[1049]: true Dec 13 02:30:35.368562 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:30:35.680024 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:30:35.368596 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:30:35.688059 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:30:35.368639 /usr/lib/systemd/system-generators/torcx-generator[941]: time="2024-12-13T02:30:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:30:35.688206 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:30:35.691417 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:30:35.691506 systemd[1]: Finished modprobe@drm.service. Dec 13 02:30:35.698440 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:30:35.699333 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:30:35.703300 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:30:35.723345 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:30:35.723426 systemd[1]: Finished modprobe@loop.service. Dec 13 02:30:35.723620 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:30:35.740175 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:30:35.740257 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:30:35.741373 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:30:35.743336 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:30:35.745574 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:30:35.765342 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:30:35.766283 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:30:35.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.794685 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:30:35.795660 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:30:35.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.801768 udevadm[1073]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:30:35.810000 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:30:35.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:35.826973 ignition[1050]: Ignition 2.14.0 Dec 13 02:30:35.827181 ignition[1050]: deleting config from guestinfo properties Dec 13 02:30:35.831229 ignition[1050]: Successfully deleted config Dec 13 02:30:35.831789 systemd[1]: Finished ignition-delete-config.service. Dec 13 02:30:35.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.119072 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:30:36.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.118000 audit: BPF prog-id=24 op=LOAD Dec 13 02:30:36.118000 audit: BPF prog-id=25 op=LOAD Dec 13 02:30:36.118000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:30:36.118000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:30:36.120637 systemd[1]: Starting systemd-udevd.service... Dec 13 02:30:36.134266 systemd-udevd[1074]: Using default interface naming scheme 'v252'. Dec 13 02:30:36.156330 systemd[1]: Started systemd-udevd.service. Dec 13 02:30:36.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.155000 audit: BPF prog-id=26 op=LOAD Dec 13 02:30:36.157896 systemd[1]: Starting systemd-networkd.service... Dec 13 02:30:36.166000 audit: BPF prog-id=27 op=LOAD Dec 13 02:30:36.166000 audit: BPF prog-id=28 op=LOAD Dec 13 02:30:36.166000 audit: BPF prog-id=29 op=LOAD Dec 13 02:30:36.168685 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:30:36.185766 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:30:36.195512 systemd[1]: Started systemd-userdbd.service. Dec 13 02:30:36.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.225558 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:30:36.232727 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:30:36.244473 systemd-networkd[1081]: lo: Link UP Dec 13 02:30:36.244478 systemd-networkd[1081]: lo: Gained carrier Dec 13 02:30:36.244774 systemd-networkd[1081]: Enumeration completed Dec 13 02:30:36.244828 systemd[1]: Started systemd-networkd.service. Dec 13 02:30:36.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.245029 systemd-networkd[1081]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 02:30:36.247998 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:30:36.249062 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:30:36.249141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 02:30:36.249091 systemd-networkd[1081]: ens192: Link UP Dec 13 02:30:36.249204 systemd-networkd[1081]: ens192: Gained carrier Dec 13 02:30:36.263584 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1076) Dec 13 02:30:36.293769 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:30:36.297000 audit[1083]: AVC avc: denied { confidentiality } for pid=1083 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:30:36.297000 audit[1083]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556b0d275d00 a1=337fc a2=7f1df5bc9bc5 a3=5 items=110 ppid=1074 pid=1083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:36.297000 audit: CWD cwd="/" Dec 13 02:30:36.297000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=1 name=(null) inode=16948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=2 name=(null) inode=16948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=3 name=(null) inode=16949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=4 name=(null) inode=16948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=5 name=(null) inode=16950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=6 name=(null) inode=16948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=7 name=(null) inode=16951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=8 name=(null) inode=16951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=9 name=(null) inode=16952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=10 name=(null) inode=16951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=11 name=(null) inode=16953 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=12 name=(null) inode=16951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=13 name=(null) inode=16954 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=14 name=(null) inode=16951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=15 name=(null) inode=16955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=16 name=(null) inode=16951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=17 name=(null) inode=16956 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=18 name=(null) inode=16948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=19 name=(null) inode=16957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=20 name=(null) inode=16957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=21 name=(null) inode=16958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=22 name=(null) inode=16957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=23 name=(null) inode=16959 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=24 name=(null) inode=16957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=25 name=(null) inode=16960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=26 name=(null) inode=16957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=27 name=(null) inode=16961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=28 name=(null) inode=16957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=29 name=(null) inode=16962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=30 name=(null) inode=16948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=31 name=(null) inode=16963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=32 name=(null) inode=16963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=33 name=(null) inode=16964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=34 name=(null) inode=16963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=35 name=(null) inode=16965 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.303154 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 02:30:36.303260 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 02:30:36.303333 kernel: Guest personality initialized and is active Dec 13 02:30:36.303344 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 02:30:36.297000 audit: PATH item=36 name=(null) inode=16963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=37 name=(null) inode=16966 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.303939 kernel: Initialized host personality Dec 13 02:30:36.297000 audit: PATH item=38 name=(null) inode=16963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=39 name=(null) inode=16967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=40 name=(null) inode=16963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=41 name=(null) inode=16968 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=42 name=(null) inode=16948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=43 name=(null) inode=16969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=44 name=(null) inode=16969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=45 name=(null) inode=16970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=46 name=(null) inode=16969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=47 name=(null) inode=16971 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=48 name=(null) inode=16969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=49 name=(null) inode=16972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=50 name=(null) inode=16969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=51 name=(null) inode=16973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=52 name=(null) inode=16969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=53 name=(null) inode=16974 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=55 name=(null) inode=16975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=56 name=(null) inode=16975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=57 name=(null) inode=16976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=58 name=(null) inode=16975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=59 name=(null) inode=16977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=60 name=(null) inode=16975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=61 name=(null) inode=16978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=62 name=(null) inode=16978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=63 name=(null) inode=16979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=64 name=(null) inode=16978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=65 name=(null) inode=16980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=66 name=(null) inode=16978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=67 name=(null) inode=16981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=68 name=(null) inode=16978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=69 name=(null) inode=16982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=70 name=(null) inode=16978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=71 name=(null) inode=16983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=72 name=(null) inode=16975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=73 name=(null) inode=16984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=74 name=(null) inode=16984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=75 name=(null) inode=16985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=76 name=(null) inode=16984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=77 name=(null) inode=16986 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=78 name=(null) inode=16984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=79 name=(null) inode=16987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=80 name=(null) inode=16984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=81 name=(null) inode=16988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=82 name=(null) inode=16984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=83 name=(null) inode=16989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=84 name=(null) inode=16975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=85 name=(null) inode=16990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=86 name=(null) inode=16990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=87 name=(null) inode=16991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=88 name=(null) inode=16990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=89 name=(null) inode=16992 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=90 name=(null) inode=16990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=91 name=(null) inode=16993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=92 name=(null) inode=16990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=93 name=(null) inode=16994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=94 name=(null) inode=16990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=95 name=(null) inode=16995 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=96 name=(null) inode=16975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=97 name=(null) inode=16996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.323567 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:30:36.297000 audit: PATH item=98 name=(null) inode=16996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=99 name=(null) inode=16997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=100 name=(null) inode=16996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=101 name=(null) inode=16998 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=102 name=(null) inode=16996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=103 name=(null) inode=16999 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=104 name=(null) inode=16996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=105 name=(null) inode=17000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=106 name=(null) inode=16996 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=107 name=(null) inode=17001 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PATH item=109 name=(null) inode=17002 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:30:36.297000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:30:36.337542 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 02:30:36.343544 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:30:36.343696 (udev-worker)[1085]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 02:30:36.357765 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:30:36.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.358786 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:30:36.379008 lvm[1107]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:30:36.406141 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:30:36.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.406349 systemd[1]: Reached target cryptsetup.target. Dec 13 02:30:36.407454 systemd[1]: Starting lvm2-activation.service... Dec 13 02:30:36.410178 lvm[1108]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:30:36.427158 systemd[1]: Finished lvm2-activation.service. Dec 13 02:30:36.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.427340 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:30:36.428089 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:30:36.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.434403 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:30:36.652294 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:30:36.652315 systemd[1]: Reached target local-fs.target. Dec 13 02:30:36.652460 systemd[1]: Reached target machines.target. Dec 13 02:30:36.653684 systemd[1]: Starting ldconfig.service... Dec 13 02:30:36.654302 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:30:36.654340 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:30:36.655283 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:30:36.656219 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:30:36.657000 systemd[1]: Starting systemd-sysext.service... Dec 13 02:30:36.664525 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:30:36.666334 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1112 (bootctl) Dec 13 02:30:36.667096 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:30:36.675547 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:30:36.675661 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:30:36.690548 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 02:30:36.952058 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:30:36.952936 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:30:36.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.971548 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:30:36.992559 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 02:30:36.993887 systemd-fsck[1119]: fsck.fat 4.2 (2021-01-31) Dec 13 02:30:36.993887 systemd-fsck[1119]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:30:36.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:36.997444 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:30:36.998521 systemd[1]: Mounting boot.mount... Dec 13 02:30:37.010403 (sd-sysext)[1122]: Using extensions 'kubernetes'. Dec 13 02:30:37.011136 (sd-sysext)[1122]: Merged extensions into '/usr'. Dec 13 02:30:37.016749 systemd[1]: Mounted boot.mount. Dec 13 02:30:37.022950 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:30:37.024224 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:30:37.024998 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:30:37.026882 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:30:37.027888 systemd[1]: Starting modprobe@loop.service... Dec 13 02:30:37.028019 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.028109 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:30:37.028195 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:30:37.028964 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:30:37.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.031067 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:30:37.031747 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:30:37.031825 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:30:37.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.032297 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:30:37.032372 systemd[1]: Finished modprobe@loop.service. Dec 13 02:30:37.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.032771 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.033685 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:30:37.033753 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:30:37.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.034253 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:30:37.034699 systemd[1]: Finished systemd-sysext.service. Dec 13 02:30:37.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.035700 systemd[1]: Starting ensure-sysext.service... Dec 13 02:30:37.036458 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:30:37.041574 systemd[1]: Reloading. Dec 13 02:30:37.048242 systemd-tmpfiles[1130]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:30:37.050430 systemd-tmpfiles[1130]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:30:37.051734 systemd-tmpfiles[1130]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:30:37.091234 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-12-13T02:30:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:30:37.091252 /usr/lib/systemd/system-generators/torcx-generator[1149]: time="2024-12-13T02:30:37Z" level=info msg="torcx already run" Dec 13 02:30:37.152451 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:30:37.152461 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:30:37.164187 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:30:37.200000 audit: BPF prog-id=30 op=LOAD Dec 13 02:30:37.200000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:30:37.200000 audit: BPF prog-id=31 op=LOAD Dec 13 02:30:37.200000 audit: BPF prog-id=32 op=LOAD Dec 13 02:30:37.200000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:30:37.200000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:30:37.201000 audit: BPF prog-id=33 op=LOAD Dec 13 02:30:37.201000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:30:37.201000 audit: BPF prog-id=34 op=LOAD Dec 13 02:30:37.201000 audit: BPF prog-id=35 op=LOAD Dec 13 02:30:37.201000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:30:37.201000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:30:37.201000 audit: BPF prog-id=36 op=LOAD Dec 13 02:30:37.201000 audit: BPF prog-id=37 op=LOAD Dec 13 02:30:37.201000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:30:37.201000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:30:37.202000 audit: BPF prog-id=38 op=LOAD Dec 13 02:30:37.202000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:30:37.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.208413 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:30:37.210804 systemd[1]: Starting audit-rules.service... Dec 13 02:30:37.211801 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:30:37.214000 audit: BPF prog-id=39 op=LOAD Dec 13 02:30:37.213072 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:30:37.216464 systemd[1]: Starting systemd-resolved.service... Dec 13 02:30:37.216000 audit: BPF prog-id=40 op=LOAD Dec 13 02:30:37.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.218623 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:30:37.219407 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:30:37.219809 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:30:37.221308 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:30:37.224000 audit[1216]: SYSTEM_BOOT pid=1216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.228124 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:30:37.229779 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:30:37.230463 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:30:37.231258 systemd[1]: Starting modprobe@loop.service... Dec 13 02:30:37.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.231389 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.231457 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:30:37.231524 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:30:37.231922 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:30:37.231994 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:30:37.232797 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:30:37.232862 systemd[1]: Finished modprobe@loop.service. Dec 13 02:30:37.233118 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.234418 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:30:37.235456 systemd[1]: Starting modprobe@loop.service... Dec 13 02:30:37.235682 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.235780 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:30:37.235850 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:30:37.236686 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:30:37.236768 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:30:37.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.239148 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:30:37.239220 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:30:37.239518 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:30:37.239638 systemd[1]: Finished modprobe@loop.service. Dec 13 02:30:37.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.240854 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:30:37.242328 systemd[1]: Starting modprobe@drm.service... Dec 13 02:30:37.242477 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.242506 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:30:37.243257 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:30:37.243386 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:30:37.243429 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:30:37.244762 systemd[1]: Finished ensure-sysext.service. Dec 13 02:30:37.244997 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:30:37.245068 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:30:37.245713 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.251332 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:30:37.251407 systemd[1]: Finished modprobe@drm.service. Dec 13 02:30:37.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:37.267796 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:30:37.297000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:30:37.297000 audit[1239]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5011f550 a2=420 a3=0 items=0 ppid=1210 pid=1239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:37.297000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:30:37.299541 augenrules[1239]: No rules Dec 13 02:30:37.299944 systemd[1]: Finished audit-rules.service. Dec 13 02:30:37.300345 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:30:37.300486 systemd[1]: Reached target time-set.target. Dec 13 02:30:37.302598 ldconfig[1111]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:30:37.304519 systemd-resolved[1214]: Positive Trust Anchors: Dec 13 02:30:37.304758 systemd-resolved[1214]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:30:37.304817 systemd-resolved[1214]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:30:37.322340 systemd[1]: Finished ldconfig.service. Dec 13 02:30:37.323335 systemd[1]: Starting systemd-update-done.service... Dec 13 02:30:37.327992 systemd[1]: Finished systemd-update-done.service. Dec 13 02:30:37.337141 systemd-resolved[1214]: Defaulting to hostname 'linux'. Dec 13 02:30:37.338057 systemd[1]: Started systemd-resolved.service. Dec 13 02:30:37.338187 systemd[1]: Reached target network.target. Dec 13 02:30:37.338280 systemd[1]: Reached target nss-lookup.target. Dec 13 02:30:37.338378 systemd[1]: Reached target sysinit.target. Dec 13 02:30:37.338520 systemd[1]: Started motdgen.path. Dec 13 02:30:37.338633 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:30:37.338818 systemd[1]: Started logrotate.timer. Dec 13 02:30:37.338948 systemd[1]: Started mdadm.timer. Dec 13 02:30:37.339069 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:30:37.339160 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:30:37.339178 systemd[1]: Reached target paths.target. Dec 13 02:30:37.339259 systemd[1]: Reached target timers.target. Dec 13 02:30:37.339488 systemd[1]: Listening on dbus.socket. Dec 13 02:30:37.340311 systemd[1]: Starting docker.socket... Dec 13 02:30:37.342297 systemd[1]: Listening on sshd.socket. Dec 13 02:30:37.342448 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:30:37.342744 systemd[1]: Listening on docker.socket. Dec 13 02:30:37.342871 systemd[1]: Reached target sockets.target. Dec 13 02:30:37.342961 systemd[1]: Reached target basic.target. Dec 13 02:30:37.343072 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.343091 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:30:37.343716 systemd[1]: Starting containerd.service... Dec 13 02:30:37.344564 systemd[1]: Starting dbus.service... Dec 13 02:30:37.345797 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:30:37.346574 systemd[1]: Starting extend-filesystems.service... Dec 13 02:30:37.346697 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:30:37.347567 systemd[1]: Starting motdgen.service... Dec 13 02:30:37.351181 jq[1250]: false Dec 13 02:30:37.348729 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:30:37.349906 systemd[1]: Starting sshd-keygen.service... Dec 13 02:30:37.353632 systemd[1]: Starting systemd-logind.service... Dec 13 02:30:37.353744 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:30:37.353779 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:30:37.360190 jq[1260]: true Dec 13 02:30:37.354221 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:30:37.354578 systemd[1]: Starting update-engine.service... Dec 13 02:30:37.355340 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:30:37.359469 systemd[1]: Starting vmtoolsd.service... Dec 13 02:30:37.361039 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:30:37.361176 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:30:37.361337 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:30:37.361458 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:31:47.644974 systemd-timesyncd[1215]: Contacted time server 23.150.40.242:123 (0.flatcar.pool.ntp.org). Dec 13 02:31:47.645196 extend-filesystems[1251]: Found loop1 Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda1 Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda2 Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda3 Dec 13 02:31:47.645398 extend-filesystems[1251]: Found usr Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda4 Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda6 Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda7 Dec 13 02:31:47.645398 extend-filesystems[1251]: Found sda9 Dec 13 02:31:47.645398 extend-filesystems[1251]: Checking size of /dev/sda9 Dec 13 02:31:47.646958 systemd[1]: Started vmtoolsd.service. Dec 13 02:31:47.652072 jq[1263]: true Dec 13 02:31:47.652806 systemd-resolved[1214]: Clock change detected. Flushing caches. Dec 13 02:31:47.653501 systemd-timesyncd[1215]: Initial clock synchronization to Fri 2024-12-13 02:31:47.644773 UTC. Dec 13 02:31:47.662940 extend-filesystems[1251]: Old size kept for /dev/sda9 Dec 13 02:31:47.662940 extend-filesystems[1251]: Found sr0 Dec 13 02:31:47.655397 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:31:47.655492 systemd[1]: Finished extend-filesystems.service. Dec 13 02:31:47.656306 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:31:47.656388 systemd[1]: Finished motdgen.service. Dec 13 02:31:47.679987 dbus-daemon[1249]: [system] SELinux support is enabled Dec 13 02:31:47.680072 systemd[1]: Started dbus.service. Dec 13 02:31:47.681320 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:31:47.681336 systemd[1]: Reached target system-config.target. Dec 13 02:31:47.681462 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:31:47.681477 systemd[1]: Reached target user-config.target. Dec 13 02:31:47.691559 bash[1296]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:31:47.691802 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:31:47.714847 kernel: NET: Registered PF_VSOCK protocol family Dec 13 02:31:47.714907 update_engine[1259]: I1213 02:31:47.713150 1259 main.cc:92] Flatcar Update Engine starting Dec 13 02:31:47.717641 systemd[1]: Started update-engine.service. Dec 13 02:31:47.718857 systemd[1]: Started locksmithd.service. Dec 13 02:31:47.719264 update_engine[1259]: I1213 02:31:47.719249 1259 update_check_scheduler.cc:74] Next update check in 2m55s Dec 13 02:31:47.729405 env[1264]: time="2024-12-13T02:31:47.729357890Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:31:47.731502 systemd-logind[1258]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:31:47.731520 systemd-logind[1258]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:31:47.731627 systemd-logind[1258]: New seat seat0. Dec 13 02:31:47.734283 systemd[1]: Started systemd-logind.service. Dec 13 02:31:47.748723 env[1264]: time="2024-12-13T02:31:47.748699151Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:31:47.748924 env[1264]: time="2024-12-13T02:31:47.748912990Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751390 env[1264]: time="2024-12-13T02:31:47.751363889Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751390 env[1264]: time="2024-12-13T02:31:47.751382249Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751511 env[1264]: time="2024-12-13T02:31:47.751488675Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751511 env[1264]: time="2024-12-13T02:31:47.751503326Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751560 env[1264]: time="2024-12-13T02:31:47.751511516Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:31:47.751560 env[1264]: time="2024-12-13T02:31:47.751516978Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751591 env[1264]: time="2024-12-13T02:31:47.751561541Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751712 env[1264]: time="2024-12-13T02:31:47.751690883Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751781 env[1264]: time="2024-12-13T02:31:47.751758249Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:31:47.751781 env[1264]: time="2024-12-13T02:31:47.751772967Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:31:47.751846 env[1264]: time="2024-12-13T02:31:47.751803429Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:31:47.751846 env[1264]: time="2024-12-13T02:31:47.751813212Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756278613Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756296003Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756304100Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756329904Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756341016Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756349469Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756356997Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756366804Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756401606Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756415557Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756424509Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756431526Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756487789Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:31:47.758363 env[1264]: time="2024-12-13T02:31:47.756540128Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:31:47.757906 systemd[1]: Started containerd.service. Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756883117Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756900512Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756918143Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756949980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756958205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756965219Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756971380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756977805Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756984225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.756993289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.757036212Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.757046587Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.757123889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.757132903Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.758666 env[1264]: time="2024-12-13T02:31:47.757139779Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.759316 env[1264]: time="2024-12-13T02:31:47.757146683Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:31:47.759316 env[1264]: time="2024-12-13T02:31:47.757153990Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:31:47.759316 env[1264]: time="2024-12-13T02:31:47.757159974Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:31:47.759316 env[1264]: time="2024-12-13T02:31:47.757169957Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:31:47.759316 env[1264]: time="2024-12-13T02:31:47.757192107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:31:47.759400 env[1264]: time="2024-12-13T02:31:47.757303632Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:31:47.759400 env[1264]: time="2024-12-13T02:31:47.757335399Z" level=info msg="Connect containerd service" Dec 13 02:31:47.759400 env[1264]: time="2024-12-13T02:31:47.757352220Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:31:47.759400 env[1264]: time="2024-12-13T02:31:47.757666455Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:31:47.759400 env[1264]: time="2024-12-13T02:31:47.757805216Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:31:47.759400 env[1264]: time="2024-12-13T02:31:47.757827311Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:31:47.759400 env[1264]: time="2024-12-13T02:31:47.757868699Z" level=info msg="containerd successfully booted in 0.029237s" Dec 13 02:31:47.767265 env[1264]: time="2024-12-13T02:31:47.767246141Z" level=info msg="Start subscribing containerd event" Dec 13 02:31:47.767327 env[1264]: time="2024-12-13T02:31:47.767315027Z" level=info msg="Start recovering state" Dec 13 02:31:47.767402 env[1264]: time="2024-12-13T02:31:47.767392989Z" level=info msg="Start event monitor" Dec 13 02:31:47.767455 env[1264]: time="2024-12-13T02:31:47.767445321Z" level=info msg="Start snapshots syncer" Dec 13 02:31:47.767499 env[1264]: time="2024-12-13T02:31:47.767489505Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:31:47.767540 env[1264]: time="2024-12-13T02:31:47.767531160Z" level=info msg="Start streaming server" Dec 13 02:31:47.785898 systemd-networkd[1081]: ens192: Gained IPv6LL Dec 13 02:31:47.786978 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:31:47.787334 systemd[1]: Reached target network-online.target. Dec 13 02:31:47.789129 systemd[1]: Starting kubelet.service... Dec 13 02:31:47.880088 locksmithd[1304]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:31:47.921325 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:31:47.921368 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:31:48.199058 sshd_keygen[1270]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:31:48.212051 systemd[1]: Finished sshd-keygen.service. Dec 13 02:31:48.213196 systemd[1]: Starting issuegen.service... Dec 13 02:31:48.216290 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:31:48.216373 systemd[1]: Finished issuegen.service. Dec 13 02:31:48.217338 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:31:48.221757 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:31:48.222609 systemd[1]: Started getty@tty1.service. Dec 13 02:31:48.223467 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:31:48.223663 systemd[1]: Reached target getty.target. Dec 13 02:31:48.528582 systemd[1]: Started kubelet.service. Dec 13 02:31:48.528917 systemd[1]: Reached target multi-user.target. Dec 13 02:31:48.529814 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:31:48.534401 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:31:48.534493 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:31:48.534655 systemd[1]: Startup finished in 904ms (kernel) + 5.327s (initrd) + 5.395s (userspace) = 11.626s. Dec 13 02:31:48.562847 login[1372]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 02:31:48.564932 login[1373]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:31:48.572928 systemd[1]: Created slice user-500.slice. Dec 13 02:31:48.573728 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:31:48.576511 systemd-logind[1258]: New session 2 of user core. Dec 13 02:31:48.581566 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:31:48.582612 systemd[1]: Starting user@500.service... Dec 13 02:31:48.585401 (systemd)[1379]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:31:48.632140 systemd[1379]: Queued start job for default target default.target. Dec 13 02:31:48.632647 systemd[1379]: Reached target paths.target. Dec 13 02:31:48.632721 systemd[1379]: Reached target sockets.target. Dec 13 02:31:48.632783 systemd[1379]: Reached target timers.target. Dec 13 02:31:48.632848 systemd[1379]: Reached target basic.target. Dec 13 02:31:48.632926 systemd[1379]: Reached target default.target. Dec 13 02:31:48.632965 systemd[1]: Started user@500.service. Dec 13 02:31:48.633030 systemd[1379]: Startup finished in 44ms. Dec 13 02:31:48.633713 systemd[1]: Started session-2.scope. Dec 13 02:31:49.029995 kubelet[1376]: E1213 02:31:49.029971 1376 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:31:49.031098 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:31:49.031176 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:31:49.563114 login[1372]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:31:49.566675 systemd-logind[1258]: New session 1 of user core. Dec 13 02:31:49.567242 systemd[1]: Started session-1.scope. Dec 13 02:31:59.281679 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:31:59.281861 systemd[1]: Stopped kubelet.service. Dec 13 02:31:59.283019 systemd[1]: Starting kubelet.service... Dec 13 02:31:59.334721 systemd[1]: Started kubelet.service. Dec 13 02:31:59.443201 kubelet[1407]: E1213 02:31:59.443159 1407 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:31:59.445824 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:31:59.445934 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:32:09.696566 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:32:09.696721 systemd[1]: Stopped kubelet.service. Dec 13 02:32:09.698252 systemd[1]: Starting kubelet.service... Dec 13 02:32:09.767697 systemd[1]: Started kubelet.service. Dec 13 02:32:09.795263 kubelet[1416]: E1213 02:32:09.795240 1416 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:32:09.796337 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:32:09.796411 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:32:20.046955 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 02:32:20.047099 systemd[1]: Stopped kubelet.service. Dec 13 02:32:20.048250 systemd[1]: Starting kubelet.service... Dec 13 02:32:20.321679 systemd[1]: Started kubelet.service. Dec 13 02:32:20.373191 kubelet[1425]: E1213 02:32:20.373165 1425 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:32:20.374212 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:32:20.374286 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:32:27.774320 systemd[1]: Created slice system-sshd.slice. Dec 13 02:32:27.775175 systemd[1]: Started sshd@0-139.178.70.100:22-147.75.109.163:46352.service. Dec 13 02:32:27.819554 sshd[1431]: Accepted publickey for core from 147.75.109.163 port 46352 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:27.820289 sshd[1431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:27.823297 systemd[1]: Started session-3.scope. Dec 13 02:32:27.823979 systemd-logind[1258]: New session 3 of user core. Dec 13 02:32:27.872238 systemd[1]: Started sshd@1-139.178.70.100:22-147.75.109.163:46358.service. Dec 13 02:32:27.901868 sshd[1436]: Accepted publickey for core from 147.75.109.163 port 46358 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:27.902728 sshd[1436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:27.905441 systemd-logind[1258]: New session 4 of user core. Dec 13 02:32:27.905864 systemd[1]: Started session-4.scope. Dec 13 02:32:27.956187 sshd[1436]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:27.958727 systemd[1]: Started sshd@2-139.178.70.100:22-147.75.109.163:46366.service. Dec 13 02:32:27.960371 systemd-logind[1258]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:32:27.960504 systemd[1]: sshd@1-139.178.70.100:22-147.75.109.163:46358.service: Deactivated successfully. Dec 13 02:32:27.960890 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:32:27.962123 systemd-logind[1258]: Removed session 4. Dec 13 02:32:27.989387 sshd[1441]: Accepted publickey for core from 147.75.109.163 port 46366 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:27.990342 sshd[1441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:27.993270 systemd[1]: Started session-5.scope. Dec 13 02:32:27.993633 systemd-logind[1258]: New session 5 of user core. Dec 13 02:32:28.040600 sshd[1441]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:28.042566 systemd[1]: sshd@2-139.178.70.100:22-147.75.109.163:46366.service: Deactivated successfully. Dec 13 02:32:28.042916 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:32:28.043265 systemd-logind[1258]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:32:28.043873 systemd[1]: Started sshd@3-139.178.70.100:22-147.75.109.163:46378.service. Dec 13 02:32:28.044358 systemd-logind[1258]: Removed session 5. Dec 13 02:32:28.073654 sshd[1448]: Accepted publickey for core from 147.75.109.163 port 46378 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:28.074405 sshd[1448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:28.077459 systemd[1]: Started session-6.scope. Dec 13 02:32:28.077663 systemd-logind[1258]: New session 6 of user core. Dec 13 02:32:28.127385 sshd[1448]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:28.129926 systemd[1]: Started sshd@4-139.178.70.100:22-147.75.109.163:46394.service. Dec 13 02:32:28.130230 systemd[1]: sshd@3-139.178.70.100:22-147.75.109.163:46378.service: Deactivated successfully. Dec 13 02:32:28.130644 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:32:28.131022 systemd-logind[1258]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:32:28.131801 systemd-logind[1258]: Removed session 6. Dec 13 02:32:28.161424 sshd[1453]: Accepted publickey for core from 147.75.109.163 port 46394 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:28.162374 sshd[1453]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:28.165447 systemd-logind[1258]: New session 7 of user core. Dec 13 02:32:28.166090 systemd[1]: Started session-7.scope. Dec 13 02:32:28.226124 sudo[1457]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:32:28.226268 sudo[1457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:32:28.232900 dbus-daemon[1249]: \xd0ݵ\x90TV: received setenforce notice (enforcing=-981061632) Dec 13 02:32:28.233009 sudo[1457]: pam_unix(sudo:session): session closed for user root Dec 13 02:32:28.234732 sshd[1453]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:28.237151 systemd[1]: Started sshd@5-139.178.70.100:22-147.75.109.163:46408.service. Dec 13 02:32:28.237513 systemd[1]: sshd@4-139.178.70.100:22-147.75.109.163:46394.service: Deactivated successfully. Dec 13 02:32:28.237984 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:32:28.238473 systemd-logind[1258]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:32:28.239414 systemd-logind[1258]: Removed session 7. Dec 13 02:32:28.269955 sshd[1460]: Accepted publickey for core from 147.75.109.163 port 46408 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:28.270907 sshd[1460]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:28.273534 systemd-logind[1258]: New session 8 of user core. Dec 13 02:32:28.274064 systemd[1]: Started session-8.scope. Dec 13 02:32:28.323795 sudo[1465]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:32:28.324149 sudo[1465]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:32:28.326583 sudo[1465]: pam_unix(sudo:session): session closed for user root Dec 13 02:32:28.329868 sudo[1464]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:32:28.330002 sudo[1464]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:32:28.336042 systemd[1]: Stopping audit-rules.service... Dec 13 02:32:28.336000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:32:28.348085 kernel: kauditd_printk_skb: 292 callbacks suppressed Dec 13 02:32:28.348235 kernel: audit: type=1305 audit(1734057148.336:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:32:28.336000 audit[1468]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd01996270 a2=420 a3=0 items=0 ppid=1 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.349895 auditctl[1468]: No rules Dec 13 02:32:28.350185 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:32:28.350290 systemd[1]: Stopped audit-rules.service. Dec 13 02:32:28.351497 systemd[1]: Starting audit-rules.service... Dec 13 02:32:28.353600 kernel: audit: type=1300 audit(1734057148.336:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd01996270 a2=420 a3=0 items=0 ppid=1 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.354528 kernel: audit: type=1327 audit(1734057148.336:213): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:32:28.336000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:32:28.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.357965 kernel: audit: type=1131 audit(1734057148.349:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.365201 augenrules[1485]: No rules Dec 13 02:32:28.365791 systemd[1]: Finished audit-rules.service. Dec 13 02:32:28.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.370014 kernel: audit: type=1130 audit(1734057148.365:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.370085 kernel: audit: type=1106 audit(1734057148.367:216): pid=1464 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.367000 audit[1464]: USER_END pid=1464 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.368271 sudo[1464]: pam_unix(sudo:session): session closed for user root Dec 13 02:32:28.372063 sshd[1460]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:28.367000 audit[1464]: CRED_DISP pid=1464 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.375019 kernel: audit: type=1104 audit(1734057148.367:217): pid=1464 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.379853 kernel: audit: type=1106 audit(1734057148.375:218): pid=1460 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.375000 audit[1460]: USER_END pid=1460 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.377777 systemd[1]: sshd@5-139.178.70.100:22-147.75.109.163:46408.service: Deactivated successfully. Dec 13 02:32:28.379083 systemd[1]: Started sshd@6-139.178.70.100:22-147.75.109.163:46424.service. Dec 13 02:32:28.375000 audit[1460]: CRED_DISP pid=1460 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.379307 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:32:28.381151 systemd-logind[1258]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:32:28.382218 systemd-logind[1258]: Removed session 8. Dec 13 02:32:28.383844 kernel: audit: type=1104 audit(1734057148.375:219): pid=1460 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.383891 kernel: audit: type=1131 audit(1734057148.377:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.100:22-147.75.109.163:46408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.100:22-147.75.109.163:46408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:46424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.412000 audit[1491]: USER_ACCT pid=1491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.413178 sshd[1491]: Accepted publickey for core from 147.75.109.163 port 46424 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:28.412000 audit[1491]: CRED_ACQ pid=1491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.412000 audit[1491]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8af374f0 a2=3 a3=0 items=0 ppid=1 pid=1491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.412000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:28.414106 sshd[1491]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:28.417233 systemd[1]: Started session-9.scope. Dec 13 02:32:28.417871 systemd-logind[1258]: New session 9 of user core. Dec 13 02:32:28.419000 audit[1491]: USER_START pid=1491 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.420000 audit[1493]: CRED_ACQ pid=1493 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:28.465000 audit[1494]: USER_ACCT pid=1494 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.465000 audit[1494]: CRED_REFR pid=1494 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.466584 sudo[1494]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:32:28.466722 sudo[1494]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:32:28.467000 audit[1494]: USER_START pid=1494 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.473266 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Dec 13 02:32:28.474996 systemd[1]: Starting coreos-metadata.service... Dec 13 02:32:28.488028 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 02:32:28.488137 systemd[1]: Finished coreos-metadata.service. Dec 13 02:32:28.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:28.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:29.118584 systemd[1]: Stopped kubelet.service. Dec 13 02:32:29.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:29.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:29.120297 systemd[1]: Starting kubelet.service... Dec 13 02:32:29.135066 systemd[1]: Reloading. Dec 13 02:32:29.196657 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2024-12-13T02:32:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:32:29.196673 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2024-12-13T02:32:29Z" level=info msg="torcx already run" Dec 13 02:32:29.249337 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:32:29.249472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:32:29.260881 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.301000 audit: BPF prog-id=46 op=LOAD Dec 13 02:32:29.301000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit: BPF prog-id=47 op=LOAD Dec 13 02:32:29.303000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit: BPF prog-id=48 op=LOAD Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit: BPF prog-id=49 op=LOAD Dec 13 02:32:29.304000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:32:29.304000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit: BPF prog-id=50 op=LOAD Dec 13 02:32:29.304000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit: BPF prog-id=51 op=LOAD Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit: BPF prog-id=52 op=LOAD Dec 13 02:32:29.305000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:32:29.305000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.305000 audit: BPF prog-id=53 op=LOAD Dec 13 02:32:29.305000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit: BPF prog-id=54 op=LOAD Dec 13 02:32:29.306000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit: BPF prog-id=55 op=LOAD Dec 13 02:32:29.306000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit: BPF prog-id=56 op=LOAD Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit: BPF prog-id=57 op=LOAD Dec 13 02:32:29.306000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:32:29.306000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit: BPF prog-id=58 op=LOAD Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit: BPF prog-id=59 op=LOAD Dec 13 02:32:29.307000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:32:29.307000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:29.307000 audit: BPF prog-id=60 op=LOAD Dec 13 02:32:29.307000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:32:29.330263 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:32:29.330309 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:32:29.330517 systemd[1]: Stopped kubelet.service. Dec 13 02:32:29.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:32:29.332065 systemd[1]: Starting kubelet.service... Dec 13 02:32:29.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:29.597504 systemd[1]: Started kubelet.service. Dec 13 02:32:29.619938 kubelet[1620]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:32:29.620148 kubelet[1620]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:32:29.620192 kubelet[1620]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:32:29.638589 kubelet[1620]: I1213 02:32:29.638553 1620 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:32:29.897291 kubelet[1620]: I1213 02:32:29.897238 1620 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 02:32:29.897370 kubelet[1620]: I1213 02:32:29.897362 1620 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:32:29.897566 kubelet[1620]: I1213 02:32:29.897558 1620 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 02:32:30.460887 kubelet[1620]: I1213 02:32:30.460856 1620 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:32:30.518386 kubelet[1620]: E1213 02:32:30.518359 1620 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 02:32:30.518500 kubelet[1620]: I1213 02:32:30.518490 1620 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 02:32:30.527346 kubelet[1620]: I1213 02:32:30.527333 1620 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:32:30.539978 kubelet[1620]: I1213 02:32:30.539954 1620 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 02:32:30.540218 kubelet[1620]: I1213 02:32:30.540199 1620 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:32:30.540337 kubelet[1620]: I1213 02:32:30.540216 1620 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.132","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 02:32:30.540412 kubelet[1620]: I1213 02:32:30.540341 1620 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:32:30.540412 kubelet[1620]: I1213 02:32:30.540348 1620 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 02:32:30.540412 kubelet[1620]: I1213 02:32:30.540405 1620 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:32:30.566189 kubelet[1620]: I1213 02:32:30.566151 1620 kubelet.go:408] "Attempting to sync node with API server" Dec 13 02:32:30.566189 kubelet[1620]: I1213 02:32:30.566186 1620 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:32:30.566312 kubelet[1620]: I1213 02:32:30.566213 1620 kubelet.go:314] "Adding apiserver pod source" Dec 13 02:32:30.566312 kubelet[1620]: I1213 02:32:30.566225 1620 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:32:30.598671 kubelet[1620]: E1213 02:32:30.598632 1620 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:30.598671 kubelet[1620]: E1213 02:32:30.598669 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:30.650996 kubelet[1620]: I1213 02:32:30.650982 1620 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:32:30.653134 kubelet[1620]: I1213 02:32:30.653124 1620 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:32:30.654198 kubelet[1620]: W1213 02:32:30.654186 1620 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.67.124.132" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 02:32:30.654284 kubelet[1620]: E1213 02:32:30.654272 1620 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.67.124.132\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 02:32:30.654364 kubelet[1620]: W1213 02:32:30.654355 1620 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 02:32:30.654419 kubelet[1620]: E1213 02:32:30.654409 1620 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Dec 13 02:32:30.654538 kubelet[1620]: W1213 02:32:30.654508 1620 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:32:30.655091 kubelet[1620]: I1213 02:32:30.655065 1620 server.go:1269] "Started kubelet" Dec 13 02:32:30.655000 audit[1620]: AVC avc: denied { mac_admin } for pid=1620 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.655000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:32:30.655000 audit[1620]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00075aa20 a1=c000808a50 a2=c00075a9f0 a3=25 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.655000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:32:30.655000 audit[1620]: AVC avc: denied { mac_admin } for pid=1620 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.655000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:32:30.655000 audit[1620]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000821100 a1=c000808a68 a2=c00075aab0 a3=25 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.655000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:32:30.656514 kubelet[1620]: I1213 02:32:30.656200 1620 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:32:30.656514 kubelet[1620]: I1213 02:32:30.656232 1620 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:32:30.656514 kubelet[1620]: I1213 02:32:30.656285 1620 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:32:30.665336 kubelet[1620]: I1213 02:32:30.665309 1620 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:32:30.666827 kubelet[1620]: I1213 02:32:30.666815 1620 server.go:460] "Adding debug handlers to kubelet server" Dec 13 02:32:30.667374 kubelet[1620]: I1213 02:32:30.667348 1620 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:32:30.667568 kubelet[1620]: I1213 02:32:30.667558 1620 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:32:30.667795 kubelet[1620]: I1213 02:32:30.667785 1620 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 02:32:30.668959 kubelet[1620]: I1213 02:32:30.668951 1620 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 02:32:30.669180 kubelet[1620]: I1213 02:32:30.669172 1620 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 02:32:30.669254 kubelet[1620]: I1213 02:32:30.669247 1620 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:32:30.669590 kubelet[1620]: E1213 02:32:30.669582 1620 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:32:30.670909 kubelet[1620]: E1213 02:32:30.669761 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.132.18109bca8505037f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.132,UID:10.67.124.132,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.132,},FirstTimestamp:2024-12-13 02:32:30.655038335 +0000 UTC m=+1.054503953,LastTimestamp:2024-12-13 02:32:30.655038335 +0000 UTC m=+1.054503953,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.132,}" Dec 13 02:32:30.671720 kubelet[1620]: I1213 02:32:30.671710 1620 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:32:30.672281 kubelet[1620]: I1213 02:32:30.672268 1620 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:32:30.672452 kubelet[1620]: E1213 02:32:30.672444 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:30.674567 kubelet[1620]: I1213 02:32:30.674555 1620 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:32:30.679392 kubelet[1620]: E1213 02:32:30.679375 1620 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.132\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 02:32:30.679544 kubelet[1620]: W1213 02:32:30.679534 1620 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 02:32:30.679605 kubelet[1620]: E1213 02:32:30.679594 1620 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Dec 13 02:32:30.679764 kubelet[1620]: E1213 02:32:30.679685 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.132.18109bca85e2dc4e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.132,UID:10.67.124.132,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.132,},FirstTimestamp:2024-12-13 02:32:30.669577294 +0000 UTC m=+1.069042904,LastTimestamp:2024-12-13 02:32:30.669577294 +0000 UTC m=+1.069042904,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.132,}" Dec 13 02:32:30.682126 kubelet[1620]: I1213 02:32:30.682113 1620 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:32:30.682213 kubelet[1620]: I1213 02:32:30.682202 1620 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:32:30.682272 kubelet[1620]: I1213 02:32:30.682265 1620 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:32:30.683735 kubelet[1620]: I1213 02:32:30.683727 1620 policy_none.go:49] "None policy: Start" Dec 13 02:32:30.684066 kubelet[1620]: I1213 02:32:30.684059 1620 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:32:30.684123 kubelet[1620]: I1213 02:32:30.684117 1620 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:32:30.684962 kubelet[1620]: E1213 02:32:30.684918 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.132.18109bca8698bed2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.132,UID:10.67.124.132,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.132 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.132,},FirstTimestamp:2024-12-13 02:32:30.681497298 +0000 UTC m=+1.080962911,LastTimestamp:2024-12-13 02:32:30.681497298 +0000 UTC m=+1.080962911,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.132,}" Dec 13 02:32:30.688782 kubelet[1620]: E1213 02:32:30.688716 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.132.18109bca8698cbdf default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.132,UID:10.67.124.132,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.132 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.132,},FirstTimestamp:2024-12-13 02:32:30.681500639 +0000 UTC m=+1.080966244,LastTimestamp:2024-12-13 02:32:30.681500639 +0000 UTC m=+1.080966244,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.132,}" Dec 13 02:32:30.691236 systemd[1]: Created slice kubepods.slice. Dec 13 02:32:30.693795 kubelet[1620]: E1213 02:32:30.693285 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.132.18109bca8698d1d5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.132,UID:10.67.124.132,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.132 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.132,},FirstTimestamp:2024-12-13 02:32:30.681502165 +0000 UTC m=+1.080967770,LastTimestamp:2024-12-13 02:32:30.681502165 +0000 UTC m=+1.080967770,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.132,}" Dec 13 02:32:30.695230 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:32:30.698684 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:32:30.701000 audit[1635]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.701000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9e7490d0 a2=0 a3=7fff9e7490bc items=0 ppid=1620 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:32:30.702000 audit[1639]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.702000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd9f243060 a2=0 a3=7ffd9f24304c items=0 ppid=1620 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:32:30.703684 kubelet[1620]: I1213 02:32:30.703670 1620 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:32:30.702000 audit[1620]: AVC avc: denied { mac_admin } for pid=1620 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.702000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:32:30.702000 audit[1620]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e82390 a1=c000df93c8 a2=c000e82360 a3=25 items=0 ppid=1 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.702000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:32:30.704752 kubelet[1620]: I1213 02:32:30.703954 1620 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:32:30.704752 kubelet[1620]: I1213 02:32:30.704036 1620 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 02:32:30.704752 kubelet[1620]: I1213 02:32:30.704042 1620 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:32:30.704752 kubelet[1620]: I1213 02:32:30.704241 1620 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:32:30.705915 kubelet[1620]: E1213 02:32:30.705854 1620 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.132\" not found" Dec 13 02:32:30.708659 kubelet[1620]: E1213 02:32:30.708578 1620 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.132.18109bca88055fd9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.132,UID:10.67.124.132,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.132,},FirstTimestamp:2024-12-13 02:32:30.705393625 +0000 UTC m=+1.104859233,LastTimestamp:2024-12-13 02:32:30.705393625 +0000 UTC m=+1.104859233,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.132,}" Dec 13 02:32:30.706000 audit[1641]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.706000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc5afcc450 a2=0 a3=7ffc5afcc43c items=0 ppid=1620 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:32:30.723000 audit[1646]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.723000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffef8835f0 a2=0 a3=7fffef8835dc items=0 ppid=1620 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:32:30.752000 audit[1651]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.752000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffe820b1c0 a2=0 a3=7fffe820b1ac items=0 ppid=1620 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:32:30.753824 kubelet[1620]: I1213 02:32:30.753801 1620 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:32:30.753000 audit[1652]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.753000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda7f59d90 a2=0 a3=7ffda7f59d7c items=0 ppid=1620 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:32:30.754000 audit[1653]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:30.754000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce5f796c0 a2=0 a3=7ffce5f796ac items=0 ppid=1620 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.754000 audit[1654]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.754000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdcbf0c750 a2=0 a3=7ffdcbf0c73c items=0 ppid=1620 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:32:30.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:32:30.755497 kubelet[1620]: I1213 02:32:30.755488 1620 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:32:30.755560 kubelet[1620]: I1213 02:32:30.755554 1620 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:32:30.755656 kubelet[1620]: I1213 02:32:30.755649 1620 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 02:32:30.754000 audit[1655]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:30.754000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8e00c100 a2=0 a3=7ffc8e00c0ec items=0 ppid=1620 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:32:30.756130 kubelet[1620]: E1213 02:32:30.756120 1620 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 02:32:30.755000 audit[1656]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:30.755000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce0e54220 a2=0 a3=7ffce0e5420c items=0 ppid=1620 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:32:30.756000 audit[1657]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:30.756000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd4992da50 a2=0 a3=7ffd4992da3c items=0 ppid=1620 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:32:30.756000 audit[1658]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:30.756000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc405060c0 a2=0 a3=7ffc405060ac items=0 ppid=1620 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:32:30.805061 kubelet[1620]: I1213 02:32:30.805037 1620 kubelet_node_status.go:72] "Attempting to register node" node="10.67.124.132" Dec 13 02:32:30.814004 kubelet[1620]: I1213 02:32:30.813970 1620 kubelet_node_status.go:75] "Successfully registered node" node="10.67.124.132" Dec 13 02:32:30.814004 kubelet[1620]: E1213 02:32:30.813998 1620 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.132\": node \"10.67.124.132\" not found" Dec 13 02:32:30.832881 kubelet[1620]: E1213 02:32:30.832862 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:30.898479 kubelet[1620]: I1213 02:32:30.898446 1620 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 02:32:30.898634 kubelet[1620]: W1213 02:32:30.898620 1620 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 02:32:30.898700 kubelet[1620]: E1213 02:32:30.898683 1620 controller.go:145] "Failed to ensure lease exists, will retry" err="Post \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases?timeout=10s\": read tcp 139.178.70.100:36138->139.178.70.105:6443: use of closed network connection" interval="400ms" Dec 13 02:32:30.933632 kubelet[1620]: E1213 02:32:30.933595 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.034246 kubelet[1620]: E1213 02:32:31.034161 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.115000 audit[1494]: USER_END pid=1494 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:31.115000 audit[1494]: CRED_DISP pid=1494 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:32:31.116201 sudo[1494]: pam_unix(sudo:session): session closed for user root Dec 13 02:32:31.117149 sshd[1491]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:31.117000 audit[1491]: USER_END pid=1491 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:31.117000 audit[1491]: CRED_DISP pid=1491 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:31.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:46424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:31.118958 systemd[1]: sshd@6-139.178.70.100:22-147.75.109.163:46424.service: Deactivated successfully. Dec 13 02:32:31.119503 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:32:31.120329 systemd-logind[1258]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:32:31.121039 systemd-logind[1258]: Removed session 9. Dec 13 02:32:31.134989 kubelet[1620]: E1213 02:32:31.134935 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.235690 kubelet[1620]: E1213 02:32:31.235592 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.336593 kubelet[1620]: E1213 02:32:31.336565 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.437132 kubelet[1620]: E1213 02:32:31.437104 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.537785 kubelet[1620]: E1213 02:32:31.537760 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.599475 kubelet[1620]: E1213 02:32:31.599246 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:31.638419 kubelet[1620]: E1213 02:32:31.638389 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.738853 kubelet[1620]: E1213 02:32:31.738814 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.839225 kubelet[1620]: E1213 02:32:31.839187 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:31.940371 kubelet[1620]: E1213 02:32:31.940062 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:32.040430 kubelet[1620]: E1213 02:32:32.040371 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:32.140912 kubelet[1620]: E1213 02:32:32.140880 1620 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.132\" not found" Dec 13 02:32:32.242486 kubelet[1620]: I1213 02:32:32.242238 1620 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 02:32:32.242558 env[1264]: time="2024-12-13T02:32:32.242419632Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:32:32.242736 kubelet[1620]: I1213 02:32:32.242516 1620 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 02:32:32.599714 kubelet[1620]: E1213 02:32:32.599690 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:32.599858 kubelet[1620]: I1213 02:32:32.599849 1620 apiserver.go:52] "Watching apiserver" Dec 13 02:32:32.603440 kubelet[1620]: E1213 02:32:32.603423 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h7bmx" podUID="751a5630-a578-46a0-925d-0055e55ae390" Dec 13 02:32:32.606789 systemd[1]: Created slice kubepods-besteffort-pod762b4d70_5cee_4871_a50f_4c18afe1f60d.slice. Dec 13 02:32:32.614184 systemd[1]: Created slice kubepods-besteffort-pod58d76a79_3f36_4031_a67a_6e6d520aa2c4.slice. Dec 13 02:32:32.670422 kubelet[1620]: I1213 02:32:32.670408 1620 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 02:32:32.682477 kubelet[1620]: I1213 02:32:32.682455 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/751a5630-a578-46a0-925d-0055e55ae390-kubelet-dir\") pod \"csi-node-driver-h7bmx\" (UID: \"751a5630-a578-46a0-925d-0055e55ae390\") " pod="calico-system/csi-node-driver-h7bmx" Dec 13 02:32:32.682532 kubelet[1620]: I1213 02:32:32.682484 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/751a5630-a578-46a0-925d-0055e55ae390-socket-dir\") pod \"csi-node-driver-h7bmx\" (UID: \"751a5630-a578-46a0-925d-0055e55ae390\") " pod="calico-system/csi-node-driver-h7bmx" Dec 13 02:32:32.682532 kubelet[1620]: I1213 02:32:32.682504 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/762b4d70-5cee-4871-a50f-4c18afe1f60d-kube-proxy\") pod \"kube-proxy-n5vjd\" (UID: \"762b4d70-5cee-4871-a50f-4c18afe1f60d\") " pod="kube-system/kube-proxy-n5vjd" Dec 13 02:32:32.682532 kubelet[1620]: I1213 02:32:32.682515 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-xtables-lock\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682532 kubelet[1620]: I1213 02:32:32.682525 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-flexvol-driver-host\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682628 kubelet[1620]: I1213 02:32:32.682537 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/751a5630-a578-46a0-925d-0055e55ae390-varrun\") pod \"csi-node-driver-h7bmx\" (UID: \"751a5630-a578-46a0-925d-0055e55ae390\") " pod="calico-system/csi-node-driver-h7bmx" Dec 13 02:32:32.682628 kubelet[1620]: I1213 02:32:32.682546 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/751a5630-a578-46a0-925d-0055e55ae390-registration-dir\") pod \"csi-node-driver-h7bmx\" (UID: \"751a5630-a578-46a0-925d-0055e55ae390\") " pod="calico-system/csi-node-driver-h7bmx" Dec 13 02:32:32.682628 kubelet[1620]: I1213 02:32:32.682555 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9bsp9\" (UniqueName: \"kubernetes.io/projected/762b4d70-5cee-4871-a50f-4c18afe1f60d-kube-api-access-9bsp9\") pod \"kube-proxy-n5vjd\" (UID: \"762b4d70-5cee-4871-a50f-4c18afe1f60d\") " pod="kube-system/kube-proxy-n5vjd" Dec 13 02:32:32.682628 kubelet[1620]: I1213 02:32:32.682573 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/58d76a79-3f36-4031-a67a-6e6d520aa2c4-node-certs\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682628 kubelet[1620]: I1213 02:32:32.682586 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-var-lib-calico\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682726 kubelet[1620]: I1213 02:32:32.682597 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-cni-log-dir\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682726 kubelet[1620]: I1213 02:32:32.682608 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bp66f\" (UniqueName: \"kubernetes.io/projected/751a5630-a578-46a0-925d-0055e55ae390-kube-api-access-bp66f\") pod \"csi-node-driver-h7bmx\" (UID: \"751a5630-a578-46a0-925d-0055e55ae390\") " pod="calico-system/csi-node-driver-h7bmx" Dec 13 02:32:32.682726 kubelet[1620]: I1213 02:32:32.682618 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-var-run-calico\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682726 kubelet[1620]: I1213 02:32:32.682627 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-cni-net-dir\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682726 kubelet[1620]: I1213 02:32:32.682636 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8hjfk\" (UniqueName: \"kubernetes.io/projected/58d76a79-3f36-4031-a67a-6e6d520aa2c4-kube-api-access-8hjfk\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682844 kubelet[1620]: I1213 02:32:32.682650 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/762b4d70-5cee-4871-a50f-4c18afe1f60d-xtables-lock\") pod \"kube-proxy-n5vjd\" (UID: \"762b4d70-5cee-4871-a50f-4c18afe1f60d\") " pod="kube-system/kube-proxy-n5vjd" Dec 13 02:32:32.682844 kubelet[1620]: I1213 02:32:32.682666 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/762b4d70-5cee-4871-a50f-4c18afe1f60d-lib-modules\") pod \"kube-proxy-n5vjd\" (UID: \"762b4d70-5cee-4871-a50f-4c18afe1f60d\") " pod="kube-system/kube-proxy-n5vjd" Dec 13 02:32:32.682844 kubelet[1620]: I1213 02:32:32.682677 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-lib-modules\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682844 kubelet[1620]: I1213 02:32:32.682686 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-policysync\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682844 kubelet[1620]: I1213 02:32:32.682696 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/58d76a79-3f36-4031-a67a-6e6d520aa2c4-tigera-ca-bundle\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.682956 kubelet[1620]: I1213 02:32:32.682711 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/58d76a79-3f36-4031-a67a-6e6d520aa2c4-cni-bin-dir\") pod \"calico-node-j6n4n\" (UID: \"58d76a79-3f36-4031-a67a-6e6d520aa2c4\") " pod="calico-system/calico-node-j6n4n" Dec 13 02:32:32.784161 kubelet[1620]: I1213 02:32:32.784132 1620 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 02:32:32.784875 kubelet[1620]: E1213 02:32:32.784863 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:32.784953 kubelet[1620]: W1213 02:32:32.784942 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:32.785032 kubelet[1620]: E1213 02:32:32.785021 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:32.789343 kubelet[1620]: E1213 02:32:32.789327 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:32.789343 kubelet[1620]: W1213 02:32:32.789341 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:32.789424 kubelet[1620]: E1213 02:32:32.789353 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:32.795998 kubelet[1620]: E1213 02:32:32.795988 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:32.796078 kubelet[1620]: W1213 02:32:32.796069 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:32.796139 kubelet[1620]: E1213 02:32:32.796125 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:32.799163 kubelet[1620]: E1213 02:32:32.799010 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:32.799163 kubelet[1620]: W1213 02:32:32.799019 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:32.799163 kubelet[1620]: E1213 02:32:32.799046 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:32.799410 kubelet[1620]: E1213 02:32:32.799398 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:32.799410 kubelet[1620]: W1213 02:32:32.799406 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:32.799459 kubelet[1620]: E1213 02:32:32.799412 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:32.911689 update_engine[1259]: I1213 02:32:32.909946 1259 update_attempter.cc:509] Updating boot flags... Dec 13 02:32:32.913521 env[1264]: time="2024-12-13T02:32:32.913486651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n5vjd,Uid:762b4d70-5cee-4871-a50f-4c18afe1f60d,Namespace:kube-system,Attempt:0,}" Dec 13 02:32:32.918852 env[1264]: time="2024-12-13T02:32:32.918744658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j6n4n,Uid:58d76a79-3f36-4031-a67a-6e6d520aa2c4,Namespace:calico-system,Attempt:0,}" Dec 13 02:32:33.600780 kubelet[1620]: E1213 02:32:33.600750 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:33.753521 env[1264]: time="2024-12-13T02:32:33.753467383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.754061 env[1264]: time="2024-12-13T02:32:33.754045584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.757498 env[1264]: time="2024-12-13T02:32:33.757484642Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.757967 env[1264]: time="2024-12-13T02:32:33.757950995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.759434 env[1264]: time="2024-12-13T02:32:33.759419401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.760126 env[1264]: time="2024-12-13T02:32:33.760111036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.761334 env[1264]: time="2024-12-13T02:32:33.761317594Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.763754 env[1264]: time="2024-12-13T02:32:33.763718318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:33.777281 env[1264]: time="2024-12-13T02:32:33.770517545Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:33.777281 env[1264]: time="2024-12-13T02:32:33.770558587Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:33.777281 env[1264]: time="2024-12-13T02:32:33.770580756Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:33.777281 env[1264]: time="2024-12-13T02:32:33.770675668Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137 pid=1695 runtime=io.containerd.runc.v2 Dec 13 02:32:33.777857 env[1264]: time="2024-12-13T02:32:33.772027145Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:33.777857 env[1264]: time="2024-12-13T02:32:33.772062361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:33.777857 env[1264]: time="2024-12-13T02:32:33.772069879Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:33.777857 env[1264]: time="2024-12-13T02:32:33.772246783Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4b907e4bcb03d38fb3874848c1bf0318a395dde7b5f43e741cf8e4b4bae141e pid=1705 runtime=io.containerd.runc.v2 Dec 13 02:32:33.786305 systemd[1]: Started cri-containerd-a4b907e4bcb03d38fb3874848c1bf0318a395dde7b5f43e741cf8e4b4bae141e.scope. Dec 13 02:32:33.788870 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount858923621.mount: Deactivated successfully. Dec 13 02:32:33.798899 systemd[1]: run-containerd-runc-k8s.io-c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137-runc.aono9g.mount: Deactivated successfully. Dec 13 02:32:33.804801 systemd[1]: Started cri-containerd-c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137.scope. Dec 13 02:32:33.814267 kernel: kauditd_printk_skb: 242 callbacks suppressed Dec 13 02:32:33.814328 kernel: audit: type=1400 audit(1734057153.805:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814351 kernel: audit: type=1400 audit(1734057153.805:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814365 kernel: audit: type=1400 audit(1734057153.805:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.820943 kernel: audit: type=1400 audit(1734057153.805:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.820984 kernel: audit: type=1400 audit(1734057153.805:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.823663 kernel: audit: type=1400 audit(1734057153.805:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.831947 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:32:33.831992 kernel: audit: type=1400 audit(1734057153.805:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.832009 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:32:33.832021 kernel: audit: type=1400 audit(1734057153.805:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.805000 audit: BPF prog-id=61 op=LOAD Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1705 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623930376534626362303364333866623338373438343863316266 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1705 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623930376534626362303364333866623338373438343863316266 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit: BPF prog-id=62 op=LOAD Dec 13 02:32:33.813000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002325a0 items=0 ppid=1705 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623930376534626362303364333866623338373438343863316266 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.813000 audit: BPF prog-id=63 op=LOAD Dec 13 02:32:33.813000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002325e8 items=0 ppid=1705 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623930376534626362303364333866623338373438343863316266 Dec 13 02:32:33.814000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:32:33.814000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.814000 audit: BPF prog-id=64 op=LOAD Dec 13 02:32:33.814000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002329f8 items=0 ppid=1705 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623930376534626362303364333866623338373438343863316266 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.831000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:33.831000 audit[1720]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1695 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:33.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363565373831313061336631366239353863303639326234306237 Dec 13 02:32:33.838190 env[1264]: time="2024-12-13T02:32:33.838170897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n5vjd,Uid:762b4d70-5cee-4871-a50f-4c18afe1f60d,Namespace:kube-system,Attempt:0,} returns sandbox id \"a4b907e4bcb03d38fb3874848c1bf0318a395dde7b5f43e741cf8e4b4bae141e\"" Dec 13 02:32:33.839651 env[1264]: time="2024-12-13T02:32:33.839632726Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 02:32:33.844339 env[1264]: time="2024-12-13T02:32:33.844310136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j6n4n,Uid:58d76a79-3f36-4031-a67a-6e6d520aa2c4,Namespace:calico-system,Attempt:0,} returns sandbox id \"c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137\"" Dec 13 02:32:34.601686 kubelet[1620]: E1213 02:32:34.601662 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:34.757239 kubelet[1620]: E1213 02:32:34.757209 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h7bmx" podUID="751a5630-a578-46a0-925d-0055e55ae390" Dec 13 02:32:34.805950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2487135112.mount: Deactivated successfully. Dec 13 02:32:35.239124 env[1264]: time="2024-12-13T02:32:35.239094347Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.240028 env[1264]: time="2024-12-13T02:32:35.240012050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.240695 env[1264]: time="2024-12-13T02:32:35.240679644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.241276 env[1264]: time="2024-12-13T02:32:35.241260422Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 02:32:35.241625 env[1264]: time="2024-12-13T02:32:35.241611290Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.242592 env[1264]: time="2024-12-13T02:32:35.242579296Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:32:35.243207 env[1264]: time="2024-12-13T02:32:35.243079747Z" level=info msg="CreateContainer within sandbox \"a4b907e4bcb03d38fb3874848c1bf0318a395dde7b5f43e741cf8e4b4bae141e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:32:35.251847 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount242844931.mount: Deactivated successfully. Dec 13 02:32:35.254084 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2214441773.mount: Deactivated successfully. Dec 13 02:32:35.255621 env[1264]: time="2024-12-13T02:32:35.255601999Z" level=info msg="CreateContainer within sandbox \"a4b907e4bcb03d38fb3874848c1bf0318a395dde7b5f43e741cf8e4b4bae141e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d8da7fecbc84a2a3054a033aba7b5b593e732a6fec7c98dc66e245da58152de3\"" Dec 13 02:32:35.256178 env[1264]: time="2024-12-13T02:32:35.256165926Z" level=info msg="StartContainer for \"d8da7fecbc84a2a3054a033aba7b5b593e732a6fec7c98dc66e245da58152de3\"" Dec 13 02:32:35.268684 systemd[1]: Started cri-containerd-d8da7fecbc84a2a3054a033aba7b5b593e732a6fec7c98dc66e245da58152de3.scope. Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb83985d008 items=0 ppid=1705 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438646137666563626338346132613330353461303333616261376235 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit: BPF prog-id=69 op=LOAD Dec 13 02:32:35.283000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c62a8 items=0 ppid=1705 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438646137666563626338346132613330353461303333616261376235 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit: BPF prog-id=70 op=LOAD Dec 13 02:32:35.283000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c62f8 items=0 ppid=1705 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438646137666563626338346132613330353461303333616261376235 Dec 13 02:32:35.283000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:32:35.283000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:35.283000 audit: BPF prog-id=71 op=LOAD Dec 13 02:32:35.283000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c6388 items=0 ppid=1705 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438646137666563626338346132613330353461303333616261376235 Dec 13 02:32:35.297131 env[1264]: time="2024-12-13T02:32:35.297105170Z" level=info msg="StartContainer for \"d8da7fecbc84a2a3054a033aba7b5b593e732a6fec7c98dc66e245da58152de3\" returns successfully" Dec 13 02:32:35.363000 audit[1834]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.363000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd72a6ffa0 a2=0 a3=7ffd72a6ff8c items=0 ppid=1785 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:32:35.363000 audit[1835]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.363000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee4202d40 a2=0 a3=7ffee4202d2c items=0 ppid=1785 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:32:35.363000 audit[1836]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.363000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfd8da3e0 a2=0 a3=7ffcfd8da3cc items=0 ppid=1785 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:32:35.364000 audit[1837]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.364000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc94c7e7e0 a2=0 a3=7ffc94c7e7cc items=0 ppid=1785 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:32:35.365000 audit[1838]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.365000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff6f22cb0 a2=0 a3=7ffff6f22c9c items=0 ppid=1785 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:32:35.366000 audit[1839]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.366000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff573dd7c0 a2=0 a3=7fff573dd7ac items=0 ppid=1785 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:32:35.466000 audit[1840]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.466000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe9b49a300 a2=0 a3=7ffe9b49a2ec items=0 ppid=1785 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:32:35.468000 audit[1842]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.468000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff664a6890 a2=0 a3=7fff664a687c items=0 ppid=1785 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:32:35.471000 audit[1845]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.471000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcd68c2e0 a2=0 a3=7fffcd68c2cc items=0 ppid=1785 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:32:35.472000 audit[1846]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.472000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd5f2ebf0 a2=0 a3=7fffd5f2ebdc items=0 ppid=1785 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:32:35.475000 audit[1848]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.475000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7222ed70 a2=0 a3=7ffc7222ed5c items=0 ppid=1785 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:32:35.476000 audit[1849]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.476000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8b3f09f0 a2=0 a3=7ffd8b3f09dc items=0 ppid=1785 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:32:35.477000 audit[1851]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.477000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4a95edd0 a2=0 a3=7ffd4a95edbc items=0 ppid=1785 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:32:35.480000 audit[1854]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.480000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff4a42490 a2=0 a3=7ffff4a4247c items=0 ppid=1785 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:32:35.481000 audit[1855]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.481000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7db254b0 a2=0 a3=7ffe7db2549c items=0 ppid=1785 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:32:35.482000 audit[1857]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.482000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9c38b670 a2=0 a3=7ffc9c38b65c items=0 ppid=1785 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:32:35.483000 audit[1858]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.483000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd06651040 a2=0 a3=7ffd0665102c items=0 ppid=1785 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:32:35.485000 audit[1860]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.485000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd30f3430 a2=0 a3=7ffdd30f341c items=0 ppid=1785 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:32:35.488000 audit[1863]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.488000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc76870c00 a2=0 a3=7ffc76870bec items=0 ppid=1785 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:32:35.491000 audit[1866]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.491000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9a307950 a2=0 a3=7fff9a30793c items=0 ppid=1785 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:32:35.492000 audit[1867]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.492000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1a417cb0 a2=0 a3=7fff1a417c9c items=0 ppid=1785 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:32:35.494000 audit[1869]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.494000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcc5ddfab0 a2=0 a3=7ffcc5ddfa9c items=0 ppid=1785 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:32:35.520000 audit[1873]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.520000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc95d072a0 a2=0 a3=7ffc95d0728c items=0 ppid=1785 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:32:35.521000 audit[1874]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.521000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5d70f9c0 a2=0 a3=7ffe5d70f9ac items=0 ppid=1785 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:32:35.523000 audit[1876]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:32:35.523000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc255baf30 a2=0 a3=7ffc255baf1c items=0 ppid=1785 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:32:35.547000 audit[1882]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:35.547000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe783a0f80 a2=0 a3=7ffe783a0f6c items=0 ppid=1785 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.582000 audit[1882]: NETFILTER_CFG table=nat:40 family=2 entries=49 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:35.582000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=23388 a0=3 a1=7ffe783a0f80 a2=0 a3=7ffe783a0f6c items=0 ppid=1785 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.598000 audit[1890]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.598000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcfa3b6740 a2=0 a3=7ffcfa3b672c items=0 ppid=1785 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:32:35.599000 audit[1892]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.599000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4f42bc60 a2=0 a3=7ffe4f42bc4c items=0 ppid=1785 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.599000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:32:35.602162 kubelet[1620]: E1213 02:32:35.602138 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:35.602000 audit[1895]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.602000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffd9b52e70 a2=0 a3=7fffd9b52e5c items=0 ppid=1785 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:32:35.603000 audit[1896]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.603000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc93866d30 a2=0 a3=7ffc93866d1c items=0 ppid=1785 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:32:35.604000 audit[1898]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.604000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeee4ea2e0 a2=0 a3=7ffeee4ea2cc items=0 ppid=1785 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:32:35.605000 audit[1899]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.605000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcca53b050 a2=0 a3=7ffcca53b03c items=0 ppid=1785 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:32:35.607000 audit[1901]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.607000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff53055ef0 a2=0 a3=7fff53055edc items=0 ppid=1785 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:32:35.609000 audit[1904]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.609000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff33c62a60 a2=0 a3=7fff33c62a4c items=0 ppid=1785 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:32:35.610000 audit[1905]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.610000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdda29ffb0 a2=0 a3=7ffdda29ff9c items=0 ppid=1785 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:32:35.612000 audit[1907]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.612000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb9419b40 a2=0 a3=7ffdb9419b2c items=0 ppid=1785 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:32:35.612000 audit[1908]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.612000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfdb63400 a2=0 a3=7ffdfdb633ec items=0 ppid=1785 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:32:35.614000 audit[1910]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.614000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd56a24df0 a2=0 a3=7ffd56a24ddc items=0 ppid=1785 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:32:35.616000 audit[1913]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.616000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef9a1a0d0 a2=0 a3=7ffef9a1a0bc items=0 ppid=1785 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:32:35.618000 audit[1916]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.618000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff231b0010 a2=0 a3=7fff231afffc items=0 ppid=1785 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:32:35.619000 audit[1917]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.619000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd042339f0 a2=0 a3=7ffd042339dc items=0 ppid=1785 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:32:35.621000 audit[1919]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.621000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd42c475b0 a2=0 a3=7ffd42c4759c items=0 ppid=1785 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:32:35.623000 audit[1922]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.623000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffa276db10 a2=0 a3=7fffa276dafc items=0 ppid=1785 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:32:35.623000 audit[1923]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.623000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7373ce80 a2=0 a3=7fff7373ce6c items=0 ppid=1785 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:32:35.625000 audit[1925]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.625000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd6dcb5a50 a2=0 a3=7ffd6dcb5a3c items=0 ppid=1785 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:32:35.626000 audit[1926]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.626000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd9ab5360 a2=0 a3=7fffd9ab534c items=0 ppid=1785 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:32:35.627000 audit[1928]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.627000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc894855d0 a2=0 a3=7ffc894855bc items=0 ppid=1785 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:32:35.629000 audit[1931]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:32:35.629000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc1019f2e0 a2=0 a3=7ffc1019f2cc items=0 ppid=1785 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:32:35.631000 audit[1933]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:32:35.631000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdc1da03c0 a2=0 a3=7ffdc1da03ac items=0 ppid=1785 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.631000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.632000 audit[1933]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:32:35.632000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdc1da03c0 a2=0 a3=7ffdc1da03ac items=0 ppid=1785 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.632000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.791375 kubelet[1620]: E1213 02:32:35.787862 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791375 kubelet[1620]: W1213 02:32:35.787878 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791375 kubelet[1620]: E1213 02:32:35.787894 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791375 kubelet[1620]: E1213 02:32:35.788029 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791375 kubelet[1620]: W1213 02:32:35.788042 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791375 kubelet[1620]: E1213 02:32:35.788049 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791375 kubelet[1620]: E1213 02:32:35.788179 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791375 kubelet[1620]: W1213 02:32:35.788185 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791375 kubelet[1620]: E1213 02:32:35.788198 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791375 kubelet[1620]: E1213 02:32:35.788376 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791735 kubelet[1620]: W1213 02:32:35.788382 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791735 kubelet[1620]: E1213 02:32:35.788389 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791735 kubelet[1620]: E1213 02:32:35.788505 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791735 kubelet[1620]: W1213 02:32:35.788512 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791735 kubelet[1620]: E1213 02:32:35.788529 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791735 kubelet[1620]: E1213 02:32:35.788631 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791735 kubelet[1620]: W1213 02:32:35.788636 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791735 kubelet[1620]: E1213 02:32:35.788643 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791735 kubelet[1620]: E1213 02:32:35.788746 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791735 kubelet[1620]: W1213 02:32:35.788762 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791987 kubelet[1620]: E1213 02:32:35.788776 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791987 kubelet[1620]: E1213 02:32:35.788905 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791987 kubelet[1620]: W1213 02:32:35.788910 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791987 kubelet[1620]: E1213 02:32:35.788925 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791987 kubelet[1620]: E1213 02:32:35.789026 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791987 kubelet[1620]: W1213 02:32:35.789033 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791987 kubelet[1620]: E1213 02:32:35.789057 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.791987 kubelet[1620]: E1213 02:32:35.789158 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.791987 kubelet[1620]: W1213 02:32:35.789164 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.791987 kubelet[1620]: E1213 02:32:35.789176 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792217 kubelet[1620]: E1213 02:32:35.789273 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792217 kubelet[1620]: W1213 02:32:35.789279 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792217 kubelet[1620]: E1213 02:32:35.789292 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792217 kubelet[1620]: E1213 02:32:35.789454 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792217 kubelet[1620]: W1213 02:32:35.789464 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792217 kubelet[1620]: E1213 02:32:35.789474 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792217 kubelet[1620]: E1213 02:32:35.789577 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792217 kubelet[1620]: W1213 02:32:35.789591 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792217 kubelet[1620]: E1213 02:32:35.789605 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792217 kubelet[1620]: E1213 02:32:35.789711 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792442 kubelet[1620]: W1213 02:32:35.789727 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792442 kubelet[1620]: E1213 02:32:35.789734 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792442 kubelet[1620]: E1213 02:32:35.789852 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792442 kubelet[1620]: W1213 02:32:35.789860 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792442 kubelet[1620]: E1213 02:32:35.789869 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792442 kubelet[1620]: E1213 02:32:35.789979 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792442 kubelet[1620]: W1213 02:32:35.789985 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792442 kubelet[1620]: E1213 02:32:35.790003 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792442 kubelet[1620]: E1213 02:32:35.790113 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792442 kubelet[1620]: W1213 02:32:35.790119 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792673 kubelet[1620]: E1213 02:32:35.790132 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792673 kubelet[1620]: E1213 02:32:35.790231 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792673 kubelet[1620]: W1213 02:32:35.790236 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792673 kubelet[1620]: E1213 02:32:35.790249 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792673 kubelet[1620]: E1213 02:32:35.790352 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792673 kubelet[1620]: W1213 02:32:35.790379 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792673 kubelet[1620]: E1213 02:32:35.790389 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.792673 kubelet[1620]: E1213 02:32:35.790494 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.792673 kubelet[1620]: W1213 02:32:35.790508 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.792673 kubelet[1620]: E1213 02:32:35.790515 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.802494 kubelet[1620]: E1213 02:32:35.802460 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.802494 kubelet[1620]: W1213 02:32:35.802477 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.802494 kubelet[1620]: E1213 02:32:35.802487 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.802653 kubelet[1620]: E1213 02:32:35.802598 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.802653 kubelet[1620]: W1213 02:32:35.802602 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.802653 kubelet[1620]: E1213 02:32:35.802609 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.802738 kubelet[1620]: E1213 02:32:35.802698 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.802738 kubelet[1620]: W1213 02:32:35.802703 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.802738 kubelet[1620]: E1213 02:32:35.802711 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.802862 kubelet[1620]: E1213 02:32:35.802803 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.802862 kubelet[1620]: W1213 02:32:35.802807 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.802862 kubelet[1620]: E1213 02:32:35.802813 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.802937 kubelet[1620]: E1213 02:32:35.802890 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.802937 kubelet[1620]: W1213 02:32:35.802894 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.802937 kubelet[1620]: E1213 02:32:35.802898 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.803017 kubelet[1620]: E1213 02:32:35.803006 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.803017 kubelet[1620]: W1213 02:32:35.803013 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.803073 kubelet[1620]: E1213 02:32:35.803020 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.803365 kubelet[1620]: E1213 02:32:35.803185 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.803365 kubelet[1620]: W1213 02:32:35.803191 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.803365 kubelet[1620]: E1213 02:32:35.803202 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.803365 kubelet[1620]: E1213 02:32:35.803292 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.803365 kubelet[1620]: W1213 02:32:35.803297 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.803365 kubelet[1620]: E1213 02:32:35.803310 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.808455 kubelet[1620]: E1213 02:32:35.803456 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.808455 kubelet[1620]: W1213 02:32:35.803461 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.808455 kubelet[1620]: E1213 02:32:35.803469 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.808455 kubelet[1620]: E1213 02:32:35.803706 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.808455 kubelet[1620]: W1213 02:32:35.803711 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.808455 kubelet[1620]: E1213 02:32:35.803720 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.808455 kubelet[1620]: E1213 02:32:35.804100 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.808455 kubelet[1620]: W1213 02:32:35.804107 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.808455 kubelet[1620]: E1213 02:32:35.804113 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:35.808455 kubelet[1620]: E1213 02:32:35.804215 1620 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:32:35.808757 kubelet[1620]: W1213 02:32:35.804220 1620 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:32:35.808757 kubelet[1620]: E1213 02:32:35.804225 1620 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:32:36.560360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1789195965.mount: Deactivated successfully. Dec 13 02:32:36.602670 kubelet[1620]: E1213 02:32:36.602632 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:36.647496 env[1264]: time="2024-12-13T02:32:36.647457854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:36.648512 env[1264]: time="2024-12-13T02:32:36.648494176Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:36.649461 env[1264]: time="2024-12-13T02:32:36.649444084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:36.650325 env[1264]: time="2024-12-13T02:32:36.650307315Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:36.650572 env[1264]: time="2024-12-13T02:32:36.650553121Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:32:36.652138 env[1264]: time="2024-12-13T02:32:36.652121665Z" level=info msg="CreateContainer within sandbox \"c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:32:36.657538 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3872545583.mount: Deactivated successfully. Dec 13 02:32:36.667925 env[1264]: time="2024-12-13T02:32:36.667876591Z" level=info msg="CreateContainer within sandbox \"c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4a1ae2c588baf3c80cf007f047eb243f154c26ddeb0edde43d43a1befee02b69\"" Dec 13 02:32:36.668499 env[1264]: time="2024-12-13T02:32:36.668439460Z" level=info msg="StartContainer for \"4a1ae2c588baf3c80cf007f047eb243f154c26ddeb0edde43d43a1befee02b69\"" Dec 13 02:32:36.678646 systemd[1]: Started cri-containerd-4a1ae2c588baf3c80cf007f047eb243f154c26ddeb0edde43d43a1befee02b69.scope. Dec 13 02:32:36.688000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.688000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4ad7ae88f8 items=0 ppid=1695 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461316165326335383862616633633830636630303766303437656232 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit: BPF prog-id=72 op=LOAD Dec 13 02:32:36.689000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e3ba8 items=0 ppid=1695 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461316165326335383862616633633830636630303766303437656232 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit: BPF prog-id=73 op=LOAD Dec 13 02:32:36.689000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000e3bf8 items=0 ppid=1695 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461316165326335383862616633633830636630303766303437656232 Dec 13 02:32:36.689000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:32:36.689000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.689000 audit: BPF prog-id=74 op=LOAD Dec 13 02:32:36.689000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000e3c88 items=0 ppid=1695 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461316165326335383862616633633830636630303766303437656232 Dec 13 02:32:36.704250 env[1264]: time="2024-12-13T02:32:36.702413793Z" level=info msg="StartContainer for \"4a1ae2c588baf3c80cf007f047eb243f154c26ddeb0edde43d43a1befee02b69\" returns successfully" Dec 13 02:32:36.706930 systemd[1]: cri-containerd-4a1ae2c588baf3c80cf007f047eb243f154c26ddeb0edde43d43a1befee02b69.scope: Deactivated successfully. Dec 13 02:32:36.711000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:32:36.756851 kubelet[1620]: E1213 02:32:36.756649 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h7bmx" podUID="751a5630-a578-46a0-925d-0055e55ae390" Dec 13 02:32:36.842828 kubelet[1620]: I1213 02:32:36.842672 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-n5vjd" podStartSLOduration=5.439854411 podStartE2EDuration="6.842658702s" podCreationTimestamp="2024-12-13 02:32:30 +0000 UTC" firstStartedPulling="2024-12-13 02:32:33.839253386 +0000 UTC m=+4.238718990" lastFinishedPulling="2024-12-13 02:32:35.242057673 +0000 UTC m=+5.641523281" observedRunningTime="2024-12-13 02:32:35.779371122 +0000 UTC m=+6.178836740" watchObservedRunningTime="2024-12-13 02:32:36.842658702 +0000 UTC m=+7.242124326" Dec 13 02:32:37.125212 env[1264]: time="2024-12-13T02:32:37.125106312Z" level=info msg="shim disconnected" id=4a1ae2c588baf3c80cf007f047eb243f154c26ddeb0edde43d43a1befee02b69 Dec 13 02:32:37.125212 env[1264]: time="2024-12-13T02:32:37.125146612Z" level=warning msg="cleaning up after shim disconnected" id=4a1ae2c588baf3c80cf007f047eb243f154c26ddeb0edde43d43a1befee02b69 namespace=k8s.io Dec 13 02:32:37.125212 env[1264]: time="2024-12-13T02:32:37.125153449Z" level=info msg="cleaning up dead shim" Dec 13 02:32:37.130587 env[1264]: time="2024-12-13T02:32:37.130559074Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:32:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2018 runtime=io.containerd.runc.v2\n" Dec 13 02:32:37.603127 kubelet[1620]: E1213 02:32:37.603095 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:37.767034 env[1264]: time="2024-12-13T02:32:37.767012949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:32:38.508000 audit[2031]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=2031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.508000 audit[2031]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdeba9dcf0 a2=0 a3=7ffdeba9dcdc items=0 ppid=1785 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.513000 audit[2031]: NETFILTER_CFG table=nat:66 family=2 entries=46 op=nft_register_rule pid=2031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.513000 audit[2031]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffdeba9dcf0 a2=0 a3=7ffdeba9dcdc items=0 ppid=1785 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.525000 audit[2033]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.525000 audit[2033]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffde8f084e0 a2=0 a3=7ffde8f084cc items=0 ppid=1785 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.529000 audit[2033]: NETFILTER_CFG table=nat:68 family=2 entries=30 op=nft_register_rule pid=2033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.529000 audit[2033]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffde8f084e0 a2=0 a3=7ffde8f084cc items=0 ppid=1785 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.603640 kubelet[1620]: E1213 02:32:38.603609 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:38.756422 kubelet[1620]: E1213 02:32:38.756361 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h7bmx" podUID="751a5630-a578-46a0-925d-0055e55ae390" Dec 13 02:32:39.542029 kernel: kauditd_printk_skb: 420 callbacks suppressed Dec 13 02:32:39.542119 kernel: audit: type=1325 audit(1734057159.537:525): table=filter:69 family=2 entries=8 op=nft_register_rule pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:39.542142 kernel: audit: type=1300 audit(1734057159.537:525): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe784eb610 a2=0 a3=7ffe784eb5fc items=0 ppid=1785 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.537000 audit[2035]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:39.537000 audit[2035]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe784eb610 a2=0 a3=7ffe784eb5fc items=0 ppid=1785 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:39.547418 kernel: audit: type=1327 audit(1734057159.537:525): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:39.556000 audit[2035]: NETFILTER_CFG table=nat:70 family=2 entries=34 op=nft_register_chain pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:39.556000 audit[2035]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe784eb610 a2=0 a3=7ffe784eb5fc items=0 ppid=1785 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.563056 kernel: audit: type=1325 audit(1734057159.556:526): table=nat:70 family=2 entries=34 op=nft_register_chain pid=2035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:39.563103 kernel: audit: type=1300 audit(1734057159.556:526): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe784eb610 a2=0 a3=7ffe784eb5fc items=0 ppid=1785 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.563123 kernel: audit: type=1327 audit(1734057159.556:526): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:39.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:39.604385 kubelet[1620]: E1213 02:32:39.604329 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:40.570000 audit[2039]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.570000 audit[2039]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd365f870 a2=0 a3=7fffd365f85c items=0 ppid=1785 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.577393 kernel: audit: type=1325 audit(1734057160.570:527): table=filter:71 family=2 entries=8 op=nft_register_rule pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.577463 kernel: audit: type=1300 audit(1734057160.570:527): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd365f870 a2=0 a3=7fffd365f85c items=0 ppid=1785 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.577480 kernel: audit: type=1327 audit(1734057160.570:527): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:40.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:40.581000 audit[2039]: NETFILTER_CFG table=nat:72 family=2 entries=58 op=nft_register_chain pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.581000 audit[2039]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7fffd365f870 a2=0 a3=7fffd365f85c items=0 ppid=1785 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:40.581000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:40.584844 kernel: audit: type=1325 audit(1734057160.581:528): table=nat:72 family=2 entries=58 op=nft_register_chain pid=2039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:40.605075 kubelet[1620]: E1213 02:32:40.605033 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:40.756991 kubelet[1620]: E1213 02:32:40.756965 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h7bmx" podUID="751a5630-a578-46a0-925d-0055e55ae390" Dec 13 02:32:41.087186 env[1264]: time="2024-12-13T02:32:41.087158901Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:41.102311 env[1264]: time="2024-12-13T02:32:41.102278788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:41.108764 env[1264]: time="2024-12-13T02:32:41.108741893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:41.118186 env[1264]: time="2024-12-13T02:32:41.118152101Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:41.118540 env[1264]: time="2024-12-13T02:32:41.118519851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:32:41.120621 env[1264]: time="2024-12-13T02:32:41.120601178Z" level=info msg="CreateContainer within sandbox \"c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:32:41.187885 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1788554138.mount: Deactivated successfully. Dec 13 02:32:41.190557 env[1264]: time="2024-12-13T02:32:41.190527109Z" level=info msg="CreateContainer within sandbox \"c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513\"" Dec 13 02:32:41.191072 env[1264]: time="2024-12-13T02:32:41.191040463Z" level=info msg="StartContainer for \"ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513\"" Dec 13 02:32:41.205557 systemd[1]: Started cri-containerd-ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513.scope. Dec 13 02:32:41.210946 systemd[1]: run-containerd-runc-k8s.io-ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513-runc.7nsZgf.mount: Deactivated successfully. Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7fd4467a08 items=0 ppid=1695 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:41.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623930336531636633616663633636623264616538313462383564 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.219000 audit: BPF prog-id=75 op=LOAD Dec 13 02:32:41.219000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f5f68 items=0 ppid=1695 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:41.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623930336531636633616663633636623264616538313462383564 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit: BPF prog-id=76 op=LOAD Dec 13 02:32:41.220000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002f5fb8 items=0 ppid=1695 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:41.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623930336531636633616663633636623264616538313462383564 Dec 13 02:32:41.220000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:32:41.220000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { perfmon } for pid=2048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit[2048]: AVC avc: denied { bpf } for pid=2048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:41.220000 audit: BPF prog-id=77 op=LOAD Dec 13 02:32:41.220000 audit[2048]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000354048 items=0 ppid=1695 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:41.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623930336531636633616663633636623264616538313462383564 Dec 13 02:32:41.232291 env[1264]: time="2024-12-13T02:32:41.232252562Z" level=info msg="StartContainer for \"ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513\" returns successfully" Dec 13 02:32:41.605989 kubelet[1620]: E1213 02:32:41.605958 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:42.304003 env[1264]: time="2024-12-13T02:32:42.303954955Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:32:42.305403 systemd[1]: cri-containerd-ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513.scope: Deactivated successfully. Dec 13 02:32:42.307000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:32:42.318452 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513-rootfs.mount: Deactivated successfully. Dec 13 02:32:42.353849 kubelet[1620]: I1213 02:32:42.353796 1620 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 02:32:42.566709 env[1264]: time="2024-12-13T02:32:42.566625164Z" level=info msg="shim disconnected" id=ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513 Dec 13 02:32:42.566938 env[1264]: time="2024-12-13T02:32:42.566923127Z" level=warning msg="cleaning up after shim disconnected" id=ecb903e1cf3afcc66b2dae814b85da6716da0b094d6cc4935cadbb96b5402513 namespace=k8s.io Dec 13 02:32:42.567051 env[1264]: time="2024-12-13T02:32:42.567037622Z" level=info msg="cleaning up dead shim" Dec 13 02:32:42.573119 env[1264]: time="2024-12-13T02:32:42.573084570Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:32:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2089 runtime=io.containerd.runc.v2\n" Dec 13 02:32:42.606160 kubelet[1620]: E1213 02:32:42.606119 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:42.758991 systemd[1]: Created slice kubepods-besteffort-pod751a5630_a578_46a0_925d_0055e55ae390.slice. Dec 13 02:32:42.760872 env[1264]: time="2024-12-13T02:32:42.760850619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h7bmx,Uid:751a5630-a578-46a0-925d-0055e55ae390,Namespace:calico-system,Attempt:0,}" Dec 13 02:32:42.774455 env[1264]: time="2024-12-13T02:32:42.774430303Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:32:42.800451 env[1264]: time="2024-12-13T02:32:42.800403144Z" level=error msg="Failed to destroy network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:42.801424 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f-shm.mount: Deactivated successfully. Dec 13 02:32:42.802109 env[1264]: time="2024-12-13T02:32:42.802078486Z" level=error msg="encountered an error cleaning up failed sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:42.802148 env[1264]: time="2024-12-13T02:32:42.802121942Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h7bmx,Uid:751a5630-a578-46a0-925d-0055e55ae390,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:42.802540 kubelet[1620]: E1213 02:32:42.802292 1620 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:42.802540 kubelet[1620]: E1213 02:32:42.802332 1620 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h7bmx" Dec 13 02:32:42.802540 kubelet[1620]: E1213 02:32:42.802354 1620 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h7bmx" Dec 13 02:32:42.802631 kubelet[1620]: E1213 02:32:42.802388 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-h7bmx_calico-system(751a5630-a578-46a0-925d-0055e55ae390)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-h7bmx_calico-system(751a5630-a578-46a0-925d-0055e55ae390)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h7bmx" podUID="751a5630-a578-46a0-925d-0055e55ae390" Dec 13 02:32:43.606411 kubelet[1620]: E1213 02:32:43.606373 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:43.775345 kubelet[1620]: I1213 02:32:43.774951 1620 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:32:43.775622 env[1264]: time="2024-12-13T02:32:43.775588691Z" level=info msg="StopPodSandbox for \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\"" Dec 13 02:32:43.795345 env[1264]: time="2024-12-13T02:32:43.795299540Z" level=error msg="StopPodSandbox for \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\" failed" error="failed to destroy network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:43.795632 kubelet[1620]: E1213 02:32:43.795596 1620 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:32:43.795690 kubelet[1620]: E1213 02:32:43.795643 1620 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f"} Dec 13 02:32:43.795738 kubelet[1620]: E1213 02:32:43.795688 1620 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"751a5630-a578-46a0-925d-0055e55ae390\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:43.795738 kubelet[1620]: E1213 02:32:43.795707 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"751a5630-a578-46a0-925d-0055e55ae390\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h7bmx" podUID="751a5630-a578-46a0-925d-0055e55ae390" Dec 13 02:32:44.606535 kubelet[1620]: E1213 02:32:44.606506 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:45.081015 systemd[1]: Created slice kubepods-besteffort-pod78e0d881_e628_4a3a_a24c_0f7805067ab2.slice. Dec 13 02:32:45.152821 kubelet[1620]: I1213 02:32:45.152788 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2b7hp\" (UniqueName: \"kubernetes.io/projected/78e0d881-e628-4a3a-a24c-0f7805067ab2-kube-api-access-2b7hp\") pod \"nginx-deployment-8587fbcb89-4w29p\" (UID: \"78e0d881-e628-4a3a-a24c-0f7805067ab2\") " pod="default/nginx-deployment-8587fbcb89-4w29p" Dec 13 02:32:45.383943 env[1264]: time="2024-12-13T02:32:45.383879445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-4w29p,Uid:78e0d881-e628-4a3a-a24c-0f7805067ab2,Namespace:default,Attempt:0,}" Dec 13 02:32:45.581324 env[1264]: time="2024-12-13T02:32:45.581278308Z" level=error msg="Failed to destroy network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:45.582375 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de-shm.mount: Deactivated successfully. Dec 13 02:32:45.583025 env[1264]: time="2024-12-13T02:32:45.583001465Z" level=error msg="encountered an error cleaning up failed sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:45.583061 env[1264]: time="2024-12-13T02:32:45.583036441Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-4w29p,Uid:78e0d881-e628-4a3a-a24c-0f7805067ab2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:45.583198 kubelet[1620]: E1213 02:32:45.583173 1620 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:45.583236 kubelet[1620]: E1213 02:32:45.583214 1620 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-4w29p" Dec 13 02:32:45.583236 kubelet[1620]: E1213 02:32:45.583227 1620 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-4w29p" Dec 13 02:32:45.583280 kubelet[1620]: E1213 02:32:45.583257 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-4w29p_default(78e0d881-e628-4a3a-a24c-0f7805067ab2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-4w29p_default(78e0d881-e628-4a3a-a24c-0f7805067ab2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-4w29p" podUID="78e0d881-e628-4a3a-a24c-0f7805067ab2" Dec 13 02:32:45.607389 kubelet[1620]: E1213 02:32:45.607356 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:45.777667 kubelet[1620]: I1213 02:32:45.777618 1620 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:32:45.778221 env[1264]: time="2024-12-13T02:32:45.778195243Z" level=info msg="StopPodSandbox for \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\"" Dec 13 02:32:45.813281 env[1264]: time="2024-12-13T02:32:45.813247312Z" level=error msg="StopPodSandbox for \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\" failed" error="failed to destroy network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:45.813592 kubelet[1620]: E1213 02:32:45.813496 1620 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:32:45.813592 kubelet[1620]: E1213 02:32:45.813526 1620 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de"} Dec 13 02:32:45.813592 kubelet[1620]: E1213 02:32:45.813551 1620 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"78e0d881-e628-4a3a-a24c-0f7805067ab2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:45.813592 kubelet[1620]: E1213 02:32:45.813566 1620 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"78e0d881-e628-4a3a-a24c-0f7805067ab2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-4w29p" podUID="78e0d881-e628-4a3a-a24c-0f7805067ab2" Dec 13 02:32:46.608025 kubelet[1620]: E1213 02:32:46.607994 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:47.608273 kubelet[1620]: E1213 02:32:47.608240 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:47.735972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1494799055.mount: Deactivated successfully. Dec 13 02:32:47.994824 env[1264]: time="2024-12-13T02:32:47.994661215Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:48.027242 env[1264]: time="2024-12-13T02:32:48.027207267Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:48.039886 env[1264]: time="2024-12-13T02:32:48.039867699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:48.058457 env[1264]: time="2024-12-13T02:32:48.058405210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:48.059206 env[1264]: time="2024-12-13T02:32:48.059181355Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:32:48.069504 env[1264]: time="2024-12-13T02:32:48.069482403Z" level=info msg="CreateContainer within sandbox \"c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:32:48.142265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2761257783.mount: Deactivated successfully. Dec 13 02:32:48.293387 env[1264]: time="2024-12-13T02:32:48.293288814Z" level=info msg="CreateContainer within sandbox \"c165e78110a3f16b958c0692b40b7faa5a44539896be4403591c423489b5a137\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112\"" Dec 13 02:32:48.294101 env[1264]: time="2024-12-13T02:32:48.294081193Z" level=info msg="StartContainer for \"568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112\"" Dec 13 02:32:48.308082 systemd[1]: Started cri-containerd-568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112.scope. Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.324257 kernel: kauditd_printk_skb: 46 callbacks suppressed Dec 13 02:32:48.324303 kernel: audit: type=1400 audit(1734057168.322:536): avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1dbd081988 items=0 ppid=1695 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:48.330797 kernel: audit: type=1300 audit(1734057168.322:536): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1dbd081988 items=0 ppid=1695 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:48.330905 kernel: audit: type=1327 audit(1734057168.322:536): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383437343036386538366432376536353230613234623264643063 Dec 13 02:32:48.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383437343036386538366432376536353230613234623264643063 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.336786 kernel: audit: type=1400 audit(1734057168.322:537): avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.336904 kernel: audit: type=1400 audit(1734057168.322:537): avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.342011 kernel: audit: type=1400 audit(1734057168.322:537): avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.342086 kernel: audit: type=1400 audit(1734057168.322:537): avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.347443 kernel: audit: type=1400 audit(1734057168.322:537): avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.347537 kernel: audit: type=1400 audit(1734057168.322:537): avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.352993 kernel: audit: type=1400 audit(1734057168.322:537): avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.322000 audit: BPF prog-id=78 op=LOAD Dec 13 02:32:48.322000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c4218 items=0 ppid=1695 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:48.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383437343036386538366432376536353230613234623264643063 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.329000 audit: BPF prog-id=79 op=LOAD Dec 13 02:32:48.329000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c4268 items=0 ppid=1695 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:48.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383437343036386538366432376536353230613234623264643063 Dec 13 02:32:48.335000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:32:48.335000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:48.335000 audit: BPF prog-id=80 op=LOAD Dec 13 02:32:48.335000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c42f8 items=0 ppid=1695 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:48.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383437343036386538366432376536353230613234623264643063 Dec 13 02:32:48.375202 env[1264]: time="2024-12-13T02:32:48.375173673Z" level=info msg="StartContainer for \"568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112\" returns successfully" Dec 13 02:32:48.577645 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:32:48.578007 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:32:48.608375 kubelet[1620]: E1213 02:32:48.608336 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:48.795942 systemd[1]: run-containerd-runc-k8s.io-568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112-runc.wxRg3b.mount: Deactivated successfully. Dec 13 02:32:49.609356 kubelet[1620]: E1213 02:32:49.609327 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:49.794167 systemd[1]: run-containerd-runc-k8s.io-568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112-runc.aWh3Ha.mount: Deactivated successfully. Dec 13 02:32:49.796000 audit[2338]: AVC avc: denied { write } for pid=2338 comm="tee" name="fd" dev="proc" ino=30377 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:49.796000 audit[2338]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe479c4a2c a2=241 a3=1b6 items=1 ppid=2307 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:49.796000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:32:49.796000 audit: PATH item=0 name="/dev/fd/63" inode=30838 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:49.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:49.802000 audit[2336]: AVC avc: denied { write } for pid=2336 comm="tee" name="fd" dev="proc" ino=30896 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:49.802000 audit[2336]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd76fea1a a2=241 a3=1b6 items=1 ppid=2318 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:49.802000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:32:49.802000 audit: PATH item=0 name="/dev/fd/63" inode=30835 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:49.802000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:49.806000 audit[2352]: AVC avc: denied { write } for pid=2352 comm="tee" name="fd" dev="proc" ino=30902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:49.806000 audit[2352]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec649ea2a a2=241 a3=1b6 items=1 ppid=2316 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:49.806000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:32:49.806000 audit: PATH item=0 name="/dev/fd/63" inode=30858 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:49.806000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:49.812000 audit[2360]: AVC avc: denied { write } for pid=2360 comm="tee" name="fd" dev="proc" ino=30388 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:49.812000 audit[2360]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff950e4a2b a2=241 a3=1b6 items=1 ppid=2313 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:49.812000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:32:49.812000 audit: PATH item=0 name="/dev/fd/63" inode=30381 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:49.815000 audit[2364]: AVC avc: denied { write } for pid=2364 comm="tee" name="fd" dev="proc" ino=30396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:49.815000 audit[2364]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8c1e1a1b a2=241 a3=1b6 items=1 ppid=2311 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:49.815000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:32:49.815000 audit: PATH item=0 name="/dev/fd/63" inode=30382 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:49.812000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:49.815000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:49.822000 audit[2376]: AVC avc: denied { write } for pid=2376 comm="tee" name="fd" dev="proc" ino=30401 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:49.822000 audit[2376]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc49d7a2a a2=241 a3=1b6 items=1 ppid=2309 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:49.822000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:32:49.822000 audit: PATH item=0 name="/dev/fd/63" inode=30385 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:49.822000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:49.832000 audit[2390]: AVC avc: denied { write } for pid=2390 comm="tee" name="fd" dev="proc" ino=30931 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:49.832000 audit[2390]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd24cf2a2a a2=241 a3=1b6 items=1 ppid=2317 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:49.832000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:32:49.832000 audit: PATH item=0 name="/dev/fd/63" inode=30393 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:49.832000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.041000 audit: BPF prog-id=81 op=LOAD Dec 13 02:32:50.041000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd41bb7cf0 a2=98 a3=3 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.041000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.041000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit: BPF prog-id=82 op=LOAD Dec 13 02:32:50.042000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd41bb7ad0 a2=74 a3=540051 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.042000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.042000 audit: BPF prog-id=83 op=LOAD Dec 13 02:32:50.042000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd41bb7b00 a2=94 a3=2 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.042000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit: BPF prog-id=84 op=LOAD Dec 13 02:32:50.108000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd41bb79c0 a2=40 a3=1 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.108000 audit: BPF prog-id=84 op=UNLOAD Dec 13 02:32:50.108000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.108000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd41bb7a90 a2=50 a3=7ffd41bb7b70 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd41bb79d0 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41bb7a00 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41bb7910 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd41bb7a20 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd41bb7a00 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd41bb79f0 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd41bb7a20 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41bb7a00 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41bb7a20 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41bb79f0 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd41bb7a60 a2=28 a3=0 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd41bb7810 a2=50 a3=1 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit: BPF prog-id=85 op=LOAD Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd41bb7810 a2=94 a3=5 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit: BPF prog-id=85 op=UNLOAD Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd41bb78c0 a2=50 a3=1 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd41bb79e0 a2=4 a3=38 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { confidentiality } for pid=2418 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd41bb7a30 a2=94 a3=6 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { confidentiality } for pid=2418 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd41bb71e0 a2=94 a3=83 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.115000 audit[2418]: AVC avc: denied { confidentiality } for pid=2418 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:50.115000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd41bb71e0 a2=94 a3=83 items=0 ppid=2332 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit: BPF prog-id=86 op=LOAD Dec 13 02:32:50.122000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec60db6c0 a2=98 a3=1999999999999999 items=0 ppid=2332 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.122000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:32:50.122000 audit: BPF prog-id=86 op=UNLOAD Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit: BPF prog-id=87 op=LOAD Dec 13 02:32:50.122000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec60db5a0 a2=74 a3=ffff items=0 ppid=2332 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.122000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:32:50.122000 audit: BPF prog-id=87 op=UNLOAD Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.122000 audit: BPF prog-id=88 op=LOAD Dec 13 02:32:50.122000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec60db5e0 a2=40 a3=7ffec60db7c0 items=0 ppid=2332 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.122000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:32:50.122000 audit: BPF prog-id=88 op=UNLOAD Dec 13 02:32:50.429379 systemd-networkd[1081]: vxlan.calico: Link UP Dec 13 02:32:50.429384 systemd-networkd[1081]: vxlan.calico: Gained carrier Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit: BPF prog-id=89 op=LOAD Dec 13 02:32:50.482000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbdaa27a0 a2=98 a3=ffffffff items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.482000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.482000 audit: BPF prog-id=89 op=UNLOAD Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit: BPF prog-id=90 op=LOAD Dec 13 02:32:50.482000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbdaa25b0 a2=74 a3=540051 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.482000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.482000 audit: BPF prog-id=90 op=UNLOAD Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit: BPF prog-id=91 op=LOAD Dec 13 02:32:50.482000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbdaa25e0 a2=94 a3=2 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.482000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.482000 audit: BPF prog-id=91 op=UNLOAD Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbdaa24b0 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.482000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbdaa24e0 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.482000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbdaa23f0 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.482000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.482000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.482000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbdaa2500 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.482000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbdaa24e0 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbdaa24d0 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbdaa2500 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbdaa24e0 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbdaa2500 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbdaa24d0 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcbdaa2540 a2=28 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit: BPF prog-id=92 op=LOAD Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbdaa23b0 a2=40 a3=0 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit: BPF prog-id=92 op=UNLOAD Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcbdaa23a0 a2=50 a3=2800 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcbdaa23a0 a2=50 a3=2800 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit: BPF prog-id=93 op=LOAD Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbdaa1bc0 a2=94 a3=2 items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.483000 audit: BPF prog-id=93 op=UNLOAD Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.483000 audit: BPF prog-id=94 op=LOAD Dec 13 02:32:50.483000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbdaa1cc0 a2=94 a3=2d items=0 ppid=2332 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.491000 audit: BPF prog-id=95 op=LOAD Dec 13 02:32:50.491000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe134a3ad0 a2=98 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.491000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.491000 audit: BPF prog-id=95 op=UNLOAD Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit: BPF prog-id=96 op=LOAD Dec 13 02:32:50.492000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe134a38b0 a2=74 a3=540051 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.492000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.492000 audit: BPF prog-id=96 op=UNLOAD Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.492000 audit: BPF prog-id=97 op=LOAD Dec 13 02:32:50.492000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe134a38e0 a2=94 a3=2 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.492000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.492000 audit: BPF prog-id=97 op=UNLOAD Dec 13 02:32:50.567116 kubelet[1620]: E1213 02:32:50.567087 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.574000 audit: BPF prog-id=98 op=LOAD Dec 13 02:32:50.574000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe134a37a0 a2=40 a3=1 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.574000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.575000 audit: BPF prog-id=98 op=UNLOAD Dec 13 02:32:50.575000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.575000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe134a3870 a2=50 a3=7ffe134a3950 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.575000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe134a37b0 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe134a37e0 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe134a36f0 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe134a3800 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe134a37e0 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe134a37d0 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe134a3800 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe134a37e0 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe134a3800 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe134a37d0 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.593000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.593000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe134a3840 a2=28 a3=0 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe134a35f0 a2=50 a3=1 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit: BPF prog-id=99 op=LOAD Dec 13 02:32:50.594000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe134a35f0 a2=94 a3=5 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.594000 audit: BPF prog-id=99 op=UNLOAD Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe134a36a0 a2=50 a3=1 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe134a37c0 a2=4 a3=38 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { confidentiality } for pid=2472 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:50.594000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe134a3810 a2=94 a3=6 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { confidentiality } for pid=2472 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:50.594000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe134a2fc0 a2=94 a3=83 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.594000 audit[2472]: AVC avc: denied { confidentiality } for pid=2472 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:50.594000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe134a2fc0 a2=94 a3=83 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.595000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.595000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe134a4a00 a2=10 a3=f1f00800 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.595000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.595000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.595000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe134a48a0 a2=10 a3=3 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.595000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.595000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.595000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe134a4840 a2=10 a3=3 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.595000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.595000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:50.595000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe134a4840 a2=10 a3=7 items=0 ppid=2332 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.595000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:50.600000 audit: BPF prog-id=94 op=UNLOAD Dec 13 02:32:50.609569 kubelet[1620]: E1213 02:32:50.609533 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:50.795233 systemd[1]: run-containerd-runc-k8s.io-568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112-runc.zh5WXb.mount: Deactivated successfully. Dec 13 02:32:50.825000 audit[2528]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:50.825000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc131719b0 a2=0 a3=7ffc1317199c items=0 ppid=2332 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.825000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:50.846000 audit[2529]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:50.846000 audit[2529]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd9c45cbc0 a2=0 a3=7ffd9c45cbac items=0 ppid=2332 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.846000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:50.848000 audit[2531]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=2531 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:50.848000 audit[2531]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd097a86f0 a2=0 a3=7ffd097a86dc items=0 ppid=2332 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.848000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:50.878000 audit[2527]: NETFILTER_CFG table=raw:76 family=2 entries=21 op=nft_register_chain pid=2527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:50.878000 audit[2527]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc8ea900d0 a2=0 a3=7ffc8ea900bc items=0 ppid=2332 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.878000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:51.609989 kubelet[1620]: E1213 02:32:51.609959 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:52.233962 systemd-networkd[1081]: vxlan.calico: Gained IPv6LL Dec 13 02:32:52.610927 kubelet[1620]: E1213 02:32:52.610892 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:53.611040 kubelet[1620]: E1213 02:32:53.610993 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:54.612084 kubelet[1620]: E1213 02:32:54.612056 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:55.613072 kubelet[1620]: E1213 02:32:55.613038 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:55.676869 systemd[1]: Started sshd@7-139.178.70.100:22-159.89.181.166:46334.service. Dec 13 02:32:55.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-159.89.181.166:46334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:55.681333 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 02:32:55.681382 kernel: audit: type=1130 audit(1734057175.676:644): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-159.89.181.166:46334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:55.792220 sshd[2543]: kex_exchange_identification: Connection closed by remote host Dec 13 02:32:55.792517 sshd[2543]: Connection closed by 159.89.181.166 port 46334 Dec 13 02:32:55.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-159.89.181.166:46334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:55.792982 systemd[1]: sshd@7-139.178.70.100:22-159.89.181.166:46334.service: Deactivated successfully. Dec 13 02:32:55.796934 kernel: audit: type=1131 audit(1734057175.792:645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-159.89.181.166:46334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:56.613912 kubelet[1620]: E1213 02:32:56.613878 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:56.756788 env[1264]: time="2024-12-13T02:32:56.756757794Z" level=info msg="StopPodSandbox for \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\"" Dec 13 02:32:57.328551 kubelet[1620]: I1213 02:32:57.328495 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-j6n4n" podStartSLOduration=13.113446105 podStartE2EDuration="27.328478286s" podCreationTimestamp="2024-12-13 02:32:30 +0000 UTC" firstStartedPulling="2024-12-13 02:32:33.844986959 +0000 UTC m=+4.244452563" lastFinishedPulling="2024-12-13 02:32:48.060019131 +0000 UTC m=+18.459484744" observedRunningTime="2024-12-13 02:32:48.793123322 +0000 UTC m=+19.192588938" watchObservedRunningTime="2024-12-13 02:32:57.328478286 +0000 UTC m=+27.727943895" Dec 13 02:32:57.614963 kubelet[1620]: E1213 02:32:57.614591 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:57.328 [INFO][2566] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:57.329 [INFO][2566] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" iface="eth0" netns="/var/run/netns/cni-cb338ec0-4906-2b4d-e636-d474b4b6738f" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:57.329 [INFO][2566] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" iface="eth0" netns="/var/run/netns/cni-cb338ec0-4906-2b4d-e636-d474b4b6738f" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:57.330 [INFO][2566] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" iface="eth0" netns="/var/run/netns/cni-cb338ec0-4906-2b4d-e636-d474b4b6738f" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:57.330 [INFO][2566] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:57.330 [INFO][2566] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:58.066 [INFO][2572] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:58.066 [INFO][2572] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:58.066 [INFO][2572] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:58.121 [WARNING][2572] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:58.121 [INFO][2572] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:58.122 [INFO][2572] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:58.124759 env[1264]: 2024-12-13 02:32:58.123 [INFO][2566] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:32:58.127255 env[1264]: time="2024-12-13T02:32:58.125953464Z" level=info msg="TearDown network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\" successfully" Dec 13 02:32:58.127255 env[1264]: time="2024-12-13T02:32:58.125979111Z" level=info msg="StopPodSandbox for \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\" returns successfully" Dec 13 02:32:58.127255 env[1264]: time="2024-12-13T02:32:58.126384081Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h7bmx,Uid:751a5630-a578-46a0-925d-0055e55ae390,Namespace:calico-system,Attempt:1,}" Dec 13 02:32:58.126299 systemd[1]: run-netns-cni\x2dcb338ec0\x2d4906\x2d2b4d\x2de636\x2dd474b4b6738f.mount: Deactivated successfully. Dec 13 02:32:58.546935 systemd-networkd[1081]: cali186a67d1ff9: Link UP Dec 13 02:32:58.549606 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:32:58.549794 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali186a67d1ff9: link becomes ready Dec 13 02:32:58.549817 systemd-networkd[1081]: cali186a67d1ff9: Gained carrier Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.433 [INFO][2578] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.132-k8s-csi--node--driver--h7bmx-eth0 csi-node-driver- calico-system 751a5630-a578-46a0-925d-0055e55ae390 1142 0 2024-12-13 02:32:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.132 csi-node-driver-h7bmx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali186a67d1ff9 [] []}} ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.433 [INFO][2578] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.464 [INFO][2590] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" HandleID="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.496 [INFO][2590] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" HandleID="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292b70), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.132", "pod":"csi-node-driver-h7bmx", "timestamp":"2024-12-13 02:32:58.46444191 +0000 UTC"}, Hostname:"10.67.124.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.496 [INFO][2590] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.496 [INFO][2590] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.496 [INFO][2590] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.132' Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.498 [INFO][2590] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.510 [INFO][2590] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.516 [INFO][2590] ipam/ipam.go 489: Trying affinity for 192.168.14.0/26 host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.518 [INFO][2590] ipam/ipam.go 155: Attempting to load block cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.521 [INFO][2590] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.521 [INFO][2590] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.523 [INFO][2590] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57 Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.529 [INFO][2590] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.535 [INFO][2590] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.14.1/26] block=192.168.14.0/26 handle="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.535 [INFO][2590] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.14.1/26] handle="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" host="10.67.124.132" Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.535 [INFO][2590] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:58.564398 env[1264]: 2024-12-13 02:32:58.535 [INFO][2590] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.1/26] IPv6=[] ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" HandleID="k8s-pod-network.20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.564982 env[1264]: 2024-12-13 02:32:58.537 [INFO][2578] cni-plugin/k8s.go 386: Populated endpoint ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-csi--node--driver--h7bmx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"751a5630-a578-46a0-925d-0055e55ae390", ResourceVersion:"1142", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"", Pod:"csi-node-driver-h7bmx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali186a67d1ff9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:58.564982 env[1264]: 2024-12-13 02:32:58.537 [INFO][2578] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.14.1/32] ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.564982 env[1264]: 2024-12-13 02:32:58.537 [INFO][2578] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali186a67d1ff9 ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.564982 env[1264]: 2024-12-13 02:32:58.555 [INFO][2578] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.564982 env[1264]: 2024-12-13 02:32:58.555 [INFO][2578] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-csi--node--driver--h7bmx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"751a5630-a578-46a0-925d-0055e55ae390", ResourceVersion:"1142", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57", Pod:"csi-node-driver-h7bmx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali186a67d1ff9", MAC:"36:85:d6:b4:0d:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:58.564982 env[1264]: 2024-12-13 02:32:58.562 [INFO][2578] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57" Namespace="calico-system" Pod="csi-node-driver-h7bmx" WorkloadEndpoint="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:32:58.573052 env[1264]: time="2024-12-13T02:32:58.572991914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:58.573052 env[1264]: time="2024-12-13T02:32:58.573037036Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:58.573200 env[1264]: time="2024-12-13T02:32:58.573177803Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:58.573422 env[1264]: time="2024-12-13T02:32:58.573384137Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57 pid=2617 runtime=io.containerd.runc.v2 Dec 13 02:32:58.590354 systemd[1]: Started cri-containerd-20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57.scope. Dec 13 02:32:58.590000 audit[2639]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:58.590000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcbdaa90c0 a2=0 a3=7ffcbdaa90ac items=0 ppid=2332 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:58.598501 kernel: audit: type=1325 audit(1734057178.590:646): table=filter:77 family=2 entries=34 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:58.598551 kernel: audit: type=1300 audit(1734057178.590:646): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcbdaa90c0 a2=0 a3=7ffcbdaa90ac items=0 ppid=2332 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:58.590000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:58.601097 kernel: audit: type=1327 audit(1734057178.590:646): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.612025 kernel: audit: type=1400 audit(1734057178.604:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.612076 kernel: audit: type=1400 audit(1734057178.604:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.615217 kubelet[1620]: E1213 02:32:58.615182 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.618882 kernel: audit: type=1400 audit(1734057178.604:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.618919 kernel: audit: type=1400 audit(1734057178.604:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.618942 kernel: audit: type=1400 audit(1734057178.604:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.618699 systemd-resolved[1214]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.607000 audit: BPF prog-id=100 op=LOAD Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230633266653434313966616536613239663835363734373236663566 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230633266653434313966616536613239663835363734373236663566 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit: BPF prog-id=101 op=LOAD Dec 13 02:32:58.611000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dd200 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230633266653434313966616536613239663835363734373236663566 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit: BPF prog-id=102 op=LOAD Dec 13 02:32:58.611000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dd248 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230633266653434313966616536613239663835363734373236663566 Dec 13 02:32:58.611000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:32:58.611000 audit: BPF prog-id=101 op=UNLOAD Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:58.611000 audit: BPF prog-id=103 op=LOAD Dec 13 02:32:58.611000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dd658 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230633266653434313966616536613239663835363734373236663566 Dec 13 02:32:58.630279 env[1264]: time="2024-12-13T02:32:58.630236619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h7bmx,Uid:751a5630-a578-46a0-925d-0055e55ae390,Namespace:calico-system,Attempt:1,} returns sandbox id \"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57\"" Dec 13 02:32:58.631432 env[1264]: time="2024-12-13T02:32:58.631397253Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:32:59.126097 systemd[1]: run-containerd-runc-k8s.io-20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57-runc.JUElZY.mount: Deactivated successfully. Dec 13 02:32:59.615347 kubelet[1620]: E1213 02:32:59.615314 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:32:59.947886 env[1264]: time="2024-12-13T02:32:59.947793755Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:59.959255 env[1264]: time="2024-12-13T02:32:59.959237009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:59.965580 env[1264]: time="2024-12-13T02:32:59.965561338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:59.972701 env[1264]: time="2024-12-13T02:32:59.972681199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:59.972973 env[1264]: time="2024-12-13T02:32:59.972957049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:32:59.974236 env[1264]: time="2024-12-13T02:32:59.974217278Z" level=info msg="CreateContainer within sandbox \"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:32:59.991215 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1169754423.mount: Deactivated successfully. Dec 13 02:33:00.007644 env[1264]: time="2024-12-13T02:33:00.007607262Z" level=info msg="CreateContainer within sandbox \"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8d2137e1d038b9a81b647bf9764e412d42b1c119fd16c01a7bca8cfbb83e548b\"" Dec 13 02:33:00.008216 env[1264]: time="2024-12-13T02:33:00.008200457Z" level=info msg="StartContainer for \"8d2137e1d038b9a81b647bf9764e412d42b1c119fd16c01a7bca8cfbb83e548b\"" Dec 13 02:33:00.022487 systemd[1]: Started cri-containerd-8d2137e1d038b9a81b647bf9764e412d42b1c119fd16c01a7bca8cfbb83e548b.scope. Dec 13 02:33:00.041945 systemd-networkd[1081]: cali186a67d1ff9: Gained IPv6LL Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9f537357c8 items=0 ppid=2617 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:00.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864323133376531643033386239613831623634376266393736346534 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.043000 audit: BPF prog-id=104 op=LOAD Dec 13 02:33:00.043000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002b7bd8 items=0 ppid=2617 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:00.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864323133376531643033386239613831623634376266393736346534 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit: BPF prog-id=105 op=LOAD Dec 13 02:33:00.044000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002b7c28 items=0 ppid=2617 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:00.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864323133376531643033386239613831623634376266393736346534 Dec 13 02:33:00.044000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:33:00.044000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:00.044000 audit: BPF prog-id=106 op=LOAD Dec 13 02:33:00.044000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002b7cb8 items=0 ppid=2617 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:00.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864323133376531643033386239613831623634376266393736346534 Dec 13 02:33:00.063744 env[1264]: time="2024-12-13T02:33:00.063714883Z" level=info msg="StartContainer for \"8d2137e1d038b9a81b647bf9764e412d42b1c119fd16c01a7bca8cfbb83e548b\" returns successfully" Dec 13 02:33:00.064612 env[1264]: time="2024-12-13T02:33:00.064600309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:33:00.126012 systemd[1]: run-containerd-runc-k8s.io-8d2137e1d038b9a81b647bf9764e412d42b1c119fd16c01a7bca8cfbb83e548b-runc.ftxz6C.mount: Deactivated successfully. Dec 13 02:33:00.615920 kubelet[1620]: E1213 02:33:00.615884 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:01.616970 kubelet[1620]: E1213 02:33:01.616938 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:01.724624 env[1264]: time="2024-12-13T02:33:01.724599228Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:01.732169 env[1264]: time="2024-12-13T02:33:01.732150406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:01.734318 env[1264]: time="2024-12-13T02:33:01.734305345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:01.739140 env[1264]: time="2024-12-13T02:33:01.739126497Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:01.739442 env[1264]: time="2024-12-13T02:33:01.739425210Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:33:01.740664 env[1264]: time="2024-12-13T02:33:01.740648699Z" level=info msg="CreateContainer within sandbox \"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:33:01.757368 env[1264]: time="2024-12-13T02:33:01.757337397Z" level=info msg="StopPodSandbox for \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\"" Dec 13 02:33:01.767469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3932821910.mount: Deactivated successfully. Dec 13 02:33:01.769815 env[1264]: time="2024-12-13T02:33:01.769791438Z" level=info msg="CreateContainer within sandbox \"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ce88259eaeea417e81942be65fda4f48a4c331f8bfb087dbdbaadb5f979217be\"" Dec 13 02:33:01.770291 env[1264]: time="2024-12-13T02:33:01.770238223Z" level=info msg="StartContainer for \"ce88259eaeea417e81942be65fda4f48a4c331f8bfb087dbdbaadb5f979217be\"" Dec 13 02:33:01.791562 systemd[1]: Started cri-containerd-ce88259eaeea417e81942be65fda4f48a4c331f8bfb087dbdbaadb5f979217be.scope. Dec 13 02:33:01.817058 kernel: kauditd_printk_skb: 95 callbacks suppressed Dec 13 02:33:01.817135 kernel: audit: type=1400 audit(1734057181.808:671): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.817157 kernel: audit: type=1300 audit(1734057181.808:671): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f33d70f0608 items=0 ppid=2617 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:01.808000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.808000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f33d70f0608 items=0 ppid=2617 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:01.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383832353965616565613431376538313934326265363566646134 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.824740 kernel: audit: type=1327 audit(1734057181.808:671): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383832353965616565613431376538313934326265363566646134 Dec 13 02:33:01.824788 kernel: audit: type=1400 audit(1734057181.809:672): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.830707 kernel: audit: type=1400 audit(1734057181.809:672): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.830741 kernel: audit: type=1400 audit(1734057181.809:672): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.837276 kernel: audit: type=1400 audit(1734057181.809:672): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.839967 kernel: audit: type=1400 audit(1734057181.809:672): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.839988 kernel: audit: type=1400 audit(1734057181.809:672): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.840003 kernel: audit: type=1400 audit(1734057181.809:672): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.809000 audit: BPF prog-id=107 op=LOAD Dec 13 02:33:01.809000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00035a418 items=0 ppid=2617 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:01.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383832353965616565613431376538313934326265363566646134 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit: BPF prog-id=108 op=LOAD Dec 13 02:33:01.815000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00035a468 items=0 ppid=2617 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:01.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383832353965616565613431376538313934326265363566646134 Dec 13 02:33:01.815000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:33:01.815000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:01.815000 audit: BPF prog-id=109 op=LOAD Dec 13 02:33:01.815000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00035a4f8 items=0 ppid=2617 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:01.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383832353965616565613431376538313934326265363566646134 Dec 13 02:33:01.848625 env[1264]: time="2024-12-13T02:33:01.848600900Z" level=info msg="StartContainer for \"ce88259eaeea417e81942be65fda4f48a4c331f8bfb087dbdbaadb5f979217be\" returns successfully" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.842 [INFO][2707] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.843 [INFO][2707] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" iface="eth0" netns="/var/run/netns/cni-76517953-145d-a111-9943-4f0e110367f6" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.843 [INFO][2707] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" iface="eth0" netns="/var/run/netns/cni-76517953-145d-a111-9943-4f0e110367f6" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.844 [INFO][2707] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" iface="eth0" netns="/var/run/netns/cni-76517953-145d-a111-9943-4f0e110367f6" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.844 [INFO][2707] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.844 [INFO][2707] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.862 [INFO][2749] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.863 [INFO][2749] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.863 [INFO][2749] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.866 [WARNING][2749] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.866 [INFO][2749] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.867 [INFO][2749] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:01.869165 env[1264]: 2024-12-13 02:33:01.868 [INFO][2707] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:01.870686 env[1264]: time="2024-12-13T02:33:01.870660147Z" level=info msg="TearDown network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\" successfully" Dec 13 02:33:01.870686 env[1264]: time="2024-12-13T02:33:01.870684624Z" level=info msg="StopPodSandbox for \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\" returns successfully" Dec 13 02:33:01.871109 env[1264]: time="2024-12-13T02:33:01.871094784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-4w29p,Uid:78e0d881-e628-4a3a-a24c-0f7805067ab2,Namespace:default,Attempt:1,}" Dec 13 02:33:02.025542 systemd-networkd[1081]: caliceae677e5af: Link UP Dec 13 02:33:02.027822 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:33:02.027968 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliceae677e5af: link becomes ready Dec 13 02:33:02.027792 systemd-networkd[1081]: caliceae677e5af: Gained carrier Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.952 [INFO][2759] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0 nginx-deployment-8587fbcb89- default 78e0d881-e628-4a3a-a24c-0f7805067ab2 1163 0 2024-12-13 02:32:45 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.132 nginx-deployment-8587fbcb89-4w29p eth0 default [] [] [kns.default ksa.default.default] caliceae677e5af [] []}} ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.952 [INFO][2759] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.969 [INFO][2771] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" HandleID="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.983 [INFO][2771] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" HandleID="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.132", "pod":"nginx-deployment-8587fbcb89-4w29p", "timestamp":"2024-12-13 02:33:01.969810377 +0000 UTC"}, Hostname:"10.67.124.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.983 [INFO][2771] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.983 [INFO][2771] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.984 [INFO][2771] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.132' Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.985 [INFO][2771] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:01.995 [INFO][2771] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.005 [INFO][2771] ipam/ipam.go 489: Trying affinity for 192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.006 [INFO][2771] ipam/ipam.go 155: Attempting to load block cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.007 [INFO][2771] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.007 [INFO][2771] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.008 [INFO][2771] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.015 [INFO][2771] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.022 [INFO][2771] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.14.2/26] block=192.168.14.0/26 handle="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.022 [INFO][2771] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.14.2/26] handle="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" host="10.67.124.132" Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.022 [INFO][2771] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:02.039926 env[1264]: 2024-12-13 02:33:02.022 [INFO][2771] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.2/26] IPv6=[] ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" HandleID="k8s-pod-network.fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:02.040624 env[1264]: 2024-12-13 02:33:02.023 [INFO][2759] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"78e0d881-e628-4a3a-a24c-0f7805067ab2", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-4w29p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliceae677e5af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:02.040624 env[1264]: 2024-12-13 02:33:02.023 [INFO][2759] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.14.2/32] ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:02.040624 env[1264]: 2024-12-13 02:33:02.023 [INFO][2759] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliceae677e5af ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:02.040624 env[1264]: 2024-12-13 02:33:02.028 [INFO][2759] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:02.040624 env[1264]: 2024-12-13 02:33:02.028 [INFO][2759] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"78e0d881-e628-4a3a-a24c-0f7805067ab2", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae", Pod:"nginx-deployment-8587fbcb89-4w29p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliceae677e5af", MAC:"1e:8f:ef:39:04:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:02.040624 env[1264]: 2024-12-13 02:33:02.038 [INFO][2759] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae" Namespace="default" Pod="nginx-deployment-8587fbcb89-4w29p" WorkloadEndpoint="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:02.047000 audit[2792]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:33:02.047000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffe91570d0 a2=0 a3=7fffe91570bc items=0 ppid=2332 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:33:02.052533 env[1264]: time="2024-12-13T02:33:02.052496418Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:33:02.052601 env[1264]: time="2024-12-13T02:33:02.052521706Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:33:02.052601 env[1264]: time="2024-12-13T02:33:02.052532652Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:33:02.052705 env[1264]: time="2024-12-13T02:33:02.052685917Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae pid=2801 runtime=io.containerd.runc.v2 Dec 13 02:33:02.060353 systemd[1]: Started cri-containerd-fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae.scope. Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit: BPF prog-id=110 op=LOAD Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2801 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333363666361626462386339393030653937386534386465323462 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2801 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333363666361626462386339393030653937386534386465323462 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit: BPF prog-id=111 op=LOAD Dec 13 02:33:02.068000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024550 items=0 ppid=2801 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333363666361626462386339393030653937386534386465323462 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit: BPF prog-id=112 op=LOAD Dec 13 02:33:02.068000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024598 items=0 ppid=2801 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333363666361626462386339393030653937386534386465323462 Dec 13 02:33:02.068000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:33:02.068000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:02.068000 audit: BPF prog-id=113 op=LOAD Dec 13 02:33:02.068000 audit[2809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000249a8 items=0 ppid=2801 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:02.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333363666361626462386339393030653937386534386465323462 Dec 13 02:33:02.072034 systemd-resolved[1214]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:33:02.096801 env[1264]: time="2024-12-13T02:33:02.096772107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-4w29p,Uid:78e0d881-e628-4a3a-a24c-0f7805067ab2,Namespace:default,Attempt:1,} returns sandbox id \"fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae\"" Dec 13 02:33:02.097779 env[1264]: time="2024-12-13T02:33:02.097761429Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:33:02.617183 kubelet[1620]: E1213 02:33:02.617146 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:02.720633 kubelet[1620]: I1213 02:33:02.720400 1620 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:33:02.720633 kubelet[1620]: I1213 02:33:02.720424 1620 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:33:02.767313 systemd[1]: run-containerd-runc-k8s.io-ce88259eaeea417e81942be65fda4f48a4c331f8bfb087dbdbaadb5f979217be-runc.G5tmjZ.mount: Deactivated successfully. Dec 13 02:33:02.767387 systemd[1]: run-netns-cni\x2d76517953\x2d145d\x2da111\x2d9943\x2d4f0e110367f6.mount: Deactivated successfully. Dec 13 02:33:02.817161 kubelet[1620]: I1213 02:33:02.817115 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-h7bmx" podStartSLOduration=29.70821132 podStartE2EDuration="32.817090457s" podCreationTimestamp="2024-12-13 02:32:30 +0000 UTC" firstStartedPulling="2024-12-13 02:32:58.631114267 +0000 UTC m=+29.030579876" lastFinishedPulling="2024-12-13 02:33:01.739993408 +0000 UTC m=+32.139459013" observedRunningTime="2024-12-13 02:33:02.816957091 +0000 UTC m=+33.216422716" watchObservedRunningTime="2024-12-13 02:33:02.817090457 +0000 UTC m=+33.216556083" Dec 13 02:33:03.178351 systemd-networkd[1081]: caliceae677e5af: Gained IPv6LL Dec 13 02:33:03.617821 kubelet[1620]: E1213 02:33:03.617778 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:04.618508 kubelet[1620]: E1213 02:33:04.618477 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:04.622247 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1216944528.mount: Deactivated successfully. Dec 13 02:33:05.253675 systemd[1]: run-containerd-runc-k8s.io-568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112-runc.BZx66r.mount: Deactivated successfully. Dec 13 02:33:05.618624 kubelet[1620]: E1213 02:33:05.618599 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:05.887706 env[1264]: time="2024-12-13T02:33:05.887506179Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:05.888909 env[1264]: time="2024-12-13T02:33:05.888894933Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:05.889856 env[1264]: time="2024-12-13T02:33:05.889824366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:05.890378 env[1264]: time="2024-12-13T02:33:05.890356651Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:33:05.890873 env[1264]: time="2024-12-13T02:33:05.890859795Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:05.891733 env[1264]: time="2024-12-13T02:33:05.891714912Z" level=info msg="CreateContainer within sandbox \"fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 02:33:05.897643 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2928617087.mount: Deactivated successfully. Dec 13 02:33:05.899605 env[1264]: time="2024-12-13T02:33:05.899586386Z" level=info msg="CreateContainer within sandbox \"fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"794177e0ff8f90a2ef8c06b690d030bab21bab4f27ac979c3d04ce2689ea1a96\"" Dec 13 02:33:05.900046 env[1264]: time="2024-12-13T02:33:05.900033177Z" level=info msg="StartContainer for \"794177e0ff8f90a2ef8c06b690d030bab21bab4f27ac979c3d04ce2689ea1a96\"" Dec 13 02:33:05.908945 systemd[1]: Started cri-containerd-794177e0ff8f90a2ef8c06b690d030bab21bab4f27ac979c3d04ce2689ea1a96.scope. Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit: BPF prog-id=114 op=LOAD Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2801 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:05.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343137376530666638663930613265663863303662363930643033 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2801 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:05.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343137376530666638663930613265663863303662363930643033 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit: BPF prog-id=115 op=LOAD Dec 13 02:33:05.917000 audit[2870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d10 items=0 ppid=2801 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:05.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343137376530666638663930613265663863303662363930643033 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit: BPF prog-id=116 op=LOAD Dec 13 02:33:05.917000 audit[2870]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d58 items=0 ppid=2801 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:05.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343137376530666638663930613265663863303662363930643033 Dec 13 02:33:05.917000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:33:05.917000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:05.917000 audit: BPF prog-id=117 op=LOAD Dec 13 02:33:05.917000 audit[2870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034a168 items=0 ppid=2801 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:05.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343137376530666638663930613265663863303662363930643033 Dec 13 02:33:05.928079 env[1264]: time="2024-12-13T02:33:05.927769888Z" level=info msg="StartContainer for \"794177e0ff8f90a2ef8c06b690d030bab21bab4f27ac979c3d04ce2689ea1a96\" returns successfully" Dec 13 02:33:06.619472 kubelet[1620]: E1213 02:33:06.619440 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:07.620205 kubelet[1620]: E1213 02:33:07.620183 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:08.621413 kubelet[1620]: E1213 02:33:08.621377 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:09.622287 kubelet[1620]: E1213 02:33:09.622241 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:10.567326 kubelet[1620]: E1213 02:33:10.567295 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:10.622700 kubelet[1620]: E1213 02:33:10.622675 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:11.623212 kubelet[1620]: E1213 02:33:11.623185 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:12.624124 kubelet[1620]: E1213 02:33:12.624093 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:13.625146 kubelet[1620]: E1213 02:33:13.625110 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:14.626075 kubelet[1620]: E1213 02:33:14.626049 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:14.784284 kernel: kauditd_printk_skb: 150 callbacks suppressed Dec 13 02:33:14.784383 kernel: audit: type=1325 audit(1734057194.775:714): table=filter:79 family=2 entries=20 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:14.784409 kernel: audit: type=1300 audit(1734057194.775:714): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc8c1bbf50 a2=0 a3=7ffc8c1bbf3c items=0 ppid=1785 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:14.775000 audit[2929]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:14.775000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc8c1bbf50 a2=0 a3=7ffc8c1bbf3c items=0 ppid=1785 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:14.786630 kernel: audit: type=1327 audit(1734057194.775:714): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:14.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:14.785000 audit[2929]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:14.794578 kernel: audit: type=1325 audit(1734057194.785:715): table=nat:80 family=2 entries=22 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:14.794690 kernel: audit: type=1300 audit(1734057194.785:715): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc8c1bbf50 a2=0 a3=0 items=0 ppid=1785 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:14.785000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc8c1bbf50 a2=0 a3=0 items=0 ppid=1785 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:14.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:14.797102 kernel: audit: type=1327 audit(1734057194.785:715): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:14.801000 audit[2933]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:14.801000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffcb8d4ea0 a2=0 a3=7fffcb8d4e8c items=0 ppid=1785 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:14.809721 kernel: audit: type=1325 audit(1734057194.801:716): table=filter:81 family=2 entries=32 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:14.809804 kernel: audit: type=1300 audit(1734057194.801:716): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffcb8d4ea0 a2=0 a3=7fffcb8d4e8c items=0 ppid=1785 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:14.809823 kernel: audit: type=1327 audit(1734057194.801:716): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:14.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:14.811000 audit[2933]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:14.811000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffcb8d4ea0 a2=0 a3=0 items=0 ppid=1785 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:14.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:14.816854 kernel: audit: type=1325 audit(1734057194.811:717): table=nat:82 family=2 entries=22 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:15.627258 kubelet[1620]: E1213 02:33:15.627229 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:15.687631 kubelet[1620]: I1213 02:33:15.687594 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-4w29p" podStartSLOduration=26.894071704 podStartE2EDuration="30.687579506s" podCreationTimestamp="2024-12-13 02:32:45 +0000 UTC" firstStartedPulling="2024-12-13 02:33:02.097486005 +0000 UTC m=+32.496951611" lastFinishedPulling="2024-12-13 02:33:05.890993805 +0000 UTC m=+36.290459413" observedRunningTime="2024-12-13 02:33:06.819435635 +0000 UTC m=+37.218901259" watchObservedRunningTime="2024-12-13 02:33:15.687579506 +0000 UTC m=+46.087045116" Dec 13 02:33:15.691527 systemd[1]: Created slice kubepods-besteffort-pod8ebecaed_0729_4958_a933_3d7b911c7d49.slice. Dec 13 02:33:15.700912 kubelet[1620]: I1213 02:33:15.700879 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/8ebecaed-0729-4958-a933-3d7b911c7d49-data\") pod \"nfs-server-provisioner-0\" (UID: \"8ebecaed-0729-4958-a933-3d7b911c7d49\") " pod="default/nfs-server-provisioner-0" Dec 13 02:33:15.701082 kubelet[1620]: I1213 02:33:15.701070 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b4fvz\" (UniqueName: \"kubernetes.io/projected/8ebecaed-0729-4958-a933-3d7b911c7d49-kube-api-access-b4fvz\") pod \"nfs-server-provisioner-0\" (UID: \"8ebecaed-0729-4958-a933-3d7b911c7d49\") " pod="default/nfs-server-provisioner-0" Dec 13 02:33:15.994683 env[1264]: time="2024-12-13T02:33:15.994259190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8ebecaed-0729-4958-a933-3d7b911c7d49,Namespace:default,Attempt:0,}" Dec 13 02:33:16.079899 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:33:16.080014 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 02:33:16.080215 systemd-networkd[1081]: cali60e51b789ff: Link UP Dec 13 02:33:16.080313 systemd-networkd[1081]: cali60e51b789ff: Gained carrier Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.023 [INFO][2935] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.132-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 8ebecaed-0729-4958-a933-3d7b911c7d49 1234 0 2024-12-13 02:33:15 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.132 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.023 [INFO][2935] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.046 [INFO][2946] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" HandleID="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Workload="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.054 [INFO][2946] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" HandleID="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Workload="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318ad0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.132", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 02:33:16.046556049 +0000 UTC"}, Hostname:"10.67.124.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.054 [INFO][2946] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.054 [INFO][2946] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.054 [INFO][2946] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.132' Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.055 [INFO][2946] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.058 [INFO][2946] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.062 [INFO][2946] ipam/ipam.go 489: Trying affinity for 192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.067 [INFO][2946] ipam/ipam.go 155: Attempting to load block cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.068 [INFO][2946] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.068 [INFO][2946] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.069 [INFO][2946] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69 Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.071 [INFO][2946] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.075 [INFO][2946] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.14.3/26] block=192.168.14.0/26 handle="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.075 [INFO][2946] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.14.3/26] handle="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" host="10.67.124.132" Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.075 [INFO][2946] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:16.088145 env[1264]: 2024-12-13 02:33:16.075 [INFO][2946] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.3/26] IPv6=[] ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" HandleID="k8s-pod-network.9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Workload="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:33:16.088595 env[1264]: 2024-12-13 02:33:16.076 [INFO][2935] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8ebecaed-0729-4958-a933-3d7b911c7d49", ResourceVersion:"1234", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 33, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.14.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:16.088595 env[1264]: 2024-12-13 02:33:16.076 [INFO][2935] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.14.3/32] ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:33:16.088595 env[1264]: 2024-12-13 02:33:16.076 [INFO][2935] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:33:16.088595 env[1264]: 2024-12-13 02:33:16.079 [INFO][2935] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:33:16.088725 env[1264]: 2024-12-13 02:33:16.080 [INFO][2935] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8ebecaed-0729-4958-a933-3d7b911c7d49", ResourceVersion:"1234", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 33, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.14.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"96:86:2a:c5:92:58", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:16.088725 env[1264]: 2024-12-13 02:33:16.086 [INFO][2935] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.132-k8s-nfs--server--provisioner--0-eth0" Dec 13 02:33:16.096614 env[1264]: time="2024-12-13T02:33:16.096462483Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:33:16.096614 env[1264]: time="2024-12-13T02:33:16.096492493Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:33:16.096614 env[1264]: time="2024-12-13T02:33:16.096499521Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:33:16.096867 env[1264]: time="2024-12-13T02:33:16.096684901Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69 pid=2972 runtime=io.containerd.runc.v2 Dec 13 02:33:16.111000 audit[2991]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:33:16.111000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc14d68060 a2=0 a3=7ffc14d6804c items=0 ppid=2332 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:16.111000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:33:16.117896 systemd[1]: Started cri-containerd-9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69.scope. Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.126000 audit: BPF prog-id=118 op=LOAD Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:16.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343631303364366463316634616533386438393737383933326439 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:16.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343631303364366463316634616533386438393737383933326439 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit: BPF prog-id=119 op=LOAD Dec 13 02:33:16.127000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000243520 items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:16.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343631303364366463316634616533386438393737383933326439 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.127000 audit: BPF prog-id=120 op=LOAD Dec 13 02:33:16.127000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000243568 items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:16.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343631303364366463316634616533386438393737383933326439 Dec 13 02:33:16.128000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:33:16.128000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:16.128000 audit: BPF prog-id=121 op=LOAD Dec 13 02:33:16.128000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000243978 items=0 ppid=2972 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:16.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343631303364366463316634616533386438393737383933326439 Dec 13 02:33:16.131375 systemd-resolved[1214]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:33:16.150785 env[1264]: time="2024-12-13T02:33:16.150756816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8ebecaed-0729-4958-a933-3d7b911c7d49,Namespace:default,Attempt:0,} returns sandbox id \"9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69\"" Dec 13 02:33:16.152022 env[1264]: time="2024-12-13T02:33:16.151998906Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 02:33:16.627941 kubelet[1620]: E1213 02:33:16.627895 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:16.811196 systemd[1]: run-containerd-runc-k8s.io-9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69-runc.ImX3hi.mount: Deactivated successfully. Dec 13 02:33:17.130014 systemd-networkd[1081]: cali60e51b789ff: Gained IPv6LL Dec 13 02:33:17.628757 kubelet[1620]: E1213 02:33:17.628715 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:18.521350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1650000071.mount: Deactivated successfully. Dec 13 02:33:18.629817 kubelet[1620]: E1213 02:33:18.629768 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:19.630311 kubelet[1620]: E1213 02:33:19.630271 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:20.461501 env[1264]: time="2024-12-13T02:33:20.461407981Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:20.462760 env[1264]: time="2024-12-13T02:33:20.462737201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:20.464811 env[1264]: time="2024-12-13T02:33:20.464789271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:20.466646 env[1264]: time="2024-12-13T02:33:20.466624010Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:20.467389 env[1264]: time="2024-12-13T02:33:20.467361782Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 02:33:20.469558 env[1264]: time="2024-12-13T02:33:20.469523113Z" level=info msg="CreateContainer within sandbox \"9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 02:33:20.476346 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3985473862.mount: Deactivated successfully. Dec 13 02:33:20.480778 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2129028988.mount: Deactivated successfully. Dec 13 02:33:20.483504 env[1264]: time="2024-12-13T02:33:20.483475001Z" level=info msg="CreateContainer within sandbox \"9146103d6dc1f4ae38d89778932d936df27bdb9a8a5cd064c3ba561dca38ae69\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"51af8461d771ae809d7c22f3e4562633a3f0735df4a79dac1922dcd922649c82\"" Dec 13 02:33:20.484026 env[1264]: time="2024-12-13T02:33:20.484013985Z" level=info msg="StartContainer for \"51af8461d771ae809d7c22f3e4562633a3f0735df4a79dac1922dcd922649c82\"" Dec 13 02:33:20.498984 systemd[1]: Started cri-containerd-51af8461d771ae809d7c22f3e4562633a3f0735df4a79dac1922dcd922649c82.scope. Dec 13 02:33:20.514053 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 02:33:20.514146 kernel: audit: type=1400 audit(1734057200.509:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.514172 kernel: audit: type=1400 audit(1734057200.509:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.522954 kernel: audit: type=1400 audit(1734057200.509:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.523021 kernel: audit: type=1400 audit(1734057200.509:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.525589 kernel: audit: type=1400 audit(1734057200.509:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.525905 kernel: audit: type=1400 audit(1734057200.509:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.530769 kernel: audit: type=1400 audit(1734057200.509:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.530887 kernel: audit: type=1400 audit(1734057200.509:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.533315 kernel: audit: type=1400 audit(1734057200.509:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.537998 kernel: audit: type=1400 audit(1734057200.514:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.514000 audit: BPF prog-id=122 op=LOAD Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2972 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:20.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531616638343631643737316165383039643763323266336534353632 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2972 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:20.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531616638343631643737316165383039643763323266336534353632 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.516000 audit: BPF prog-id=123 op=LOAD Dec 13 02:33:20.516000 audit[3015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025b00 items=0 ppid=2972 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:20.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531616638343631643737316165383039643763323266336534353632 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit: BPF prog-id=124 op=LOAD Dec 13 02:33:20.519000 audit[3015]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025b48 items=0 ppid=2972 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:20.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531616638343631643737316165383039643763323266336534353632 Dec 13 02:33:20.519000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:33:20.519000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { perfmon } for pid=3015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit[3015]: AVC avc: denied { bpf } for pid=3015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:20.519000 audit: BPF prog-id=125 op=LOAD Dec 13 02:33:20.519000 audit[3015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025f58 items=0 ppid=2972 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:20.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531616638343631643737316165383039643763323266336534353632 Dec 13 02:33:20.549480 env[1264]: time="2024-12-13T02:33:20.549451969Z" level=info msg="StartContainer for \"51af8461d771ae809d7c22f3e4562633a3f0735df4a79dac1922dcd922649c82\" returns successfully" Dec 13 02:33:20.581000 audit[3044]: AVC avc: denied { search } for pid=3044 comm="rpcbind" name="crypto" dev="proc" ino=35072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:33:20.581000 audit[3044]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f860b7760c0 a2=0 a3=0 items=0 ppid=3026 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 key=(null) Dec 13 02:33:20.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 02:33:20.605000 audit[3049]: AVC avc: denied { search } for pid=3049 comm="dbus-daemon" name="crypto" dev="proc" ino=35072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:33:20.605000 audit[3049]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fed255220c0 a2=0 a3=0 items=0 ppid=3026 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 key=(null) Dec 13 02:33:20.605000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:33:20.607000 audit[3050]: AVC avc: denied { watch } for pid=3050 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=529977 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c154,c350 tclass=dir permissive=0 Dec 13 02:33:20.607000 audit[3050]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=558346c40940 a2=2c8 a3=7ffcea788fdc items=0 ppid=3026 pid=3050 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 key=(null) Dec 13 02:33:20.607000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 02:33:20.609000 audit[3051]: AVC avc: denied { read } for pid=3051 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=35166 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 02:33:20.609000 audit[3051]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fe30d5f8320 a1=80000 a2=d a3=7ffe67fffdc0 items=0 ppid=3026 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 key=(null) Dec 13 02:33:20.609000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:33:20.609000 audit[3051]: AVC avc: denied { search } for pid=3051 comm="ganesha.nfsd" name="crypto" dev="proc" ino=35072 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 02:33:20.609000 audit[3051]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe30cb4c0c0 a2=0 a3=0 items=0 ppid=3026 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c350 key=(null) Dec 13 02:33:20.609000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 02:33:20.630973 kubelet[1620]: E1213 02:33:20.630944 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:20.839868 kubelet[1620]: I1213 02:33:20.839811 1620 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.522933062 podStartE2EDuration="5.839795559s" podCreationTimestamp="2024-12-13 02:33:15 +0000 UTC" firstStartedPulling="2024-12-13 02:33:16.15162894 +0000 UTC m=+46.551094547" lastFinishedPulling="2024-12-13 02:33:20.468491439 +0000 UTC m=+50.867957044" observedRunningTime="2024-12-13 02:33:20.838895843 +0000 UTC m=+51.238361459" watchObservedRunningTime="2024-12-13 02:33:20.839795559 +0000 UTC m=+51.239261176" Dec 13 02:33:20.956000 audit[3071]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=3071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:20.956000 audit[3071]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc841d0dd0 a2=0 a3=7ffc841d0dbc items=0 ppid=1785 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:20.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:20.962000 audit[3071]: NETFILTER_CFG table=nat:85 family=2 entries=106 op=nft_register_chain pid=3071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:20.962000 audit[3071]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc841d0dd0 a2=0 a3=7ffc841d0dbc items=0 ppid=1785 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:20.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:21.631353 kubelet[1620]: E1213 02:33:21.631324 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:22.632158 kubelet[1620]: E1213 02:33:22.632126 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:23.632534 kubelet[1620]: E1213 02:33:23.632504 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:24.633848 kubelet[1620]: E1213 02:33:24.633819 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:25.634491 kubelet[1620]: E1213 02:33:25.634464 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:26.635129 kubelet[1620]: E1213 02:33:26.635087 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:27.635990 kubelet[1620]: E1213 02:33:27.635963 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:28.636572 kubelet[1620]: E1213 02:33:28.636543 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:29.637203 kubelet[1620]: E1213 02:33:29.637172 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:30.566977 kubelet[1620]: E1213 02:33:30.566945 1620 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:30.631551 systemd[1]: Created slice kubepods-besteffort-podfada0cd5_976b_4919_9a1c_3ae023f04f7c.slice. Dec 13 02:33:30.637423 kubelet[1620]: E1213 02:33:30.637406 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:30.664973 env[1264]: time="2024-12-13T02:33:30.664946491Z" level=info msg="StopPodSandbox for \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\"" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.705 [WARNING][3091] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-csi--node--driver--h7bmx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"751a5630-a578-46a0-925d-0055e55ae390", ResourceVersion:"1173", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57", Pod:"csi-node-driver-h7bmx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali186a67d1ff9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.705 [INFO][3091] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.705 [INFO][3091] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" iface="eth0" netns="" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.705 [INFO][3091] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.705 [INFO][3091] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.720 [INFO][3097] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.720 [INFO][3097] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.720 [INFO][3097] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.725 [WARNING][3097] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.725 [INFO][3097] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.726 [INFO][3097] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:30.727663 env[1264]: 2024-12-13 02:33:30.726 [INFO][3091] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.728017 env[1264]: time="2024-12-13T02:33:30.727695673Z" level=info msg="TearDown network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\" successfully" Dec 13 02:33:30.728017 env[1264]: time="2024-12-13T02:33:30.727718291Z" level=info msg="StopPodSandbox for \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\" returns successfully" Dec 13 02:33:30.728392 env[1264]: time="2024-12-13T02:33:30.728370918Z" level=info msg="RemovePodSandbox for \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\"" Dec 13 02:33:30.728425 env[1264]: time="2024-12-13T02:33:30.728396964Z" level=info msg="Forcibly stopping sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\"" Dec 13 02:33:30.770940 kubelet[1620]: I1213 02:33:30.770918 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hx9rp\" (UniqueName: \"kubernetes.io/projected/fada0cd5-976b-4919-9a1c-3ae023f04f7c-kube-api-access-hx9rp\") pod \"test-pod-1\" (UID: \"fada0cd5-976b-4919-9a1c-3ae023f04f7c\") " pod="default/test-pod-1" Dec 13 02:33:30.771034 kubelet[1620]: I1213 02:33:30.770946 1620 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-ea03f219-6ec8-4124-82a4-9c9cb3ea9b73\" (UniqueName: \"kubernetes.io/nfs/fada0cd5-976b-4919-9a1c-3ae023f04f7c-pvc-ea03f219-6ec8-4124-82a4-9c9cb3ea9b73\") pod \"test-pod-1\" (UID: \"fada0cd5-976b-4919-9a1c-3ae023f04f7c\") " pod="default/test-pod-1" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.752 [WARNING][3115] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-csi--node--driver--h7bmx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"751a5630-a578-46a0-925d-0055e55ae390", ResourceVersion:"1173", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"20c2fe4419fae6a29f85674726f5fe93faf9d4b099312404eafaef88ba6cce57", Pod:"csi-node-driver-h7bmx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.14.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali186a67d1ff9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.752 [INFO][3115] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.752 [INFO][3115] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" iface="eth0" netns="" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.752 [INFO][3115] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.752 [INFO][3115] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.770 [INFO][3121] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.770 [INFO][3121] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.770 [INFO][3121] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.774 [WARNING][3121] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.774 [INFO][3121] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" HandleID="k8s-pod-network.0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Workload="10.67.124.132-k8s-csi--node--driver--h7bmx-eth0" Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.775 [INFO][3121] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:30.777078 env[1264]: 2024-12-13 02:33:30.776 [INFO][3115] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f" Dec 13 02:33:30.777388 env[1264]: time="2024-12-13T02:33:30.777080464Z" level=info msg="TearDown network for sandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\" successfully" Dec 13 02:33:30.778106 env[1264]: time="2024-12-13T02:33:30.778080330Z" level=info msg="RemovePodSandbox \"0f7732e4b5fd3a5a6fda7166bec722bcd258c81d9d9833f0dc3d29088824803f\" returns successfully" Dec 13 02:33:30.778399 env[1264]: time="2024-12-13T02:33:30.778377418Z" level=info msg="StopPodSandbox for \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\"" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.797 [WARNING][3141] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"78e0d881-e628-4a3a-a24c-0f7805067ab2", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae", Pod:"nginx-deployment-8587fbcb89-4w29p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliceae677e5af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.797 [INFO][3141] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.797 [INFO][3141] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" iface="eth0" netns="" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.797 [INFO][3141] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.797 [INFO][3141] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.809 [INFO][3147] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.809 [INFO][3147] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.809 [INFO][3147] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.813 [WARNING][3147] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.813 [INFO][3147] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.814 [INFO][3147] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:30.815973 env[1264]: 2024-12-13 02:33:30.815 [INFO][3141] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.816315 env[1264]: time="2024-12-13T02:33:30.815990800Z" level=info msg="TearDown network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\" successfully" Dec 13 02:33:30.816315 env[1264]: time="2024-12-13T02:33:30.816016173Z" level=info msg="StopPodSandbox for \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\" returns successfully" Dec 13 02:33:30.816596 env[1264]: time="2024-12-13T02:33:30.816580684Z" level=info msg="RemovePodSandbox for \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\"" Dec 13 02:33:30.816634 env[1264]: time="2024-12-13T02:33:30.816600956Z" level=info msg="Forcibly stopping sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\"" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.843 [WARNING][3166] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"78e0d881-e628-4a3a-a24c-0f7805067ab2", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 32, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"fd33cfcabdb8c9900e978e48de24ba9ad69c8ecd3d15d9e40048e28c007785ae", Pod:"nginx-deployment-8587fbcb89-4w29p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliceae677e5af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.844 [INFO][3166] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.844 [INFO][3166] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" iface="eth0" netns="" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.844 [INFO][3166] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.844 [INFO][3166] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.859 [INFO][3174] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.859 [INFO][3174] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.859 [INFO][3174] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.863 [WARNING][3174] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.863 [INFO][3174] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" HandleID="k8s-pod-network.5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Workload="10.67.124.132-k8s-nginx--deployment--8587fbcb89--4w29p-eth0" Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.864 [INFO][3174] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:30.867098 env[1264]: 2024-12-13 02:33:30.865 [INFO][3166] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de" Dec 13 02:33:30.867098 env[1264]: time="2024-12-13T02:33:30.866190072Z" level=info msg="TearDown network for sandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\" successfully" Dec 13 02:33:30.867904 env[1264]: time="2024-12-13T02:33:30.867887400Z" level=info msg="RemovePodSandbox \"5ae9da3429563143c8ec292a4a29b3577fe905e529d5e2d61dea7c38840802de\" returns successfully" Dec 13 02:33:30.896840 kernel: Failed to create system directory netfs Dec 13 02:33:30.896915 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:33:30.896933 kernel: audit: type=1400 audit(1734057210.891:762): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.891000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.900252 kernel: Failed to create system directory netfs Dec 13 02:33:30.900278 kernel: audit: type=1400 audit(1734057210.891:762): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.900293 kernel: Failed to create system directory netfs Dec 13 02:33:30.891000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.903518 kernel: audit: type=1400 audit(1734057210.891:762): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.903591 kernel: Failed to create system directory netfs Dec 13 02:33:30.891000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.906761 kernel: audit: type=1400 audit(1734057210.891:762): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.891000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.891000 audit[3186]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5642a320b5e0 a1=153bc a2=5642962a72b0 a3=5 items=0 ppid=485 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:30.914576 kernel: audit: type=1300 audit(1734057210.891:762): arch=c000003e syscall=175 success=yes exit=0 a0=5642a320b5e0 a1=153bc a2=5642962a72b0 a3=5 items=0 ppid=485 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:30.914608 kernel: Failed to create system directory fscache Dec 13 02:33:30.914623 kernel: audit: type=1327 audit(1734057210.891:762): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:33:30.914635 kernel: Failed to create system directory fscache Dec 13 02:33:30.891000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:33:30.917843 kernel: audit: type=1400 audit(1734057210.910:763): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.917868 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.921100 kernel: audit: type=1400 audit(1734057210.910:763): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.921123 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.924358 kernel: audit: type=1400 audit(1734057210.910:763): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.924385 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.927608 kernel: audit: type=1400 audit(1734057210.910:763): avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.927633 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.928909 kernel: Failed to create system directory fscache Dec 13 02:33:30.928935 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.930252 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.930956 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.932214 kernel: Failed to create system directory fscache Dec 13 02:33:30.932236 kernel: Failed to create system directory fscache Dec 13 02:33:30.932256 kernel: Failed to create system directory fscache Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.910000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.933862 kernel: Failed to create system directory fscache Dec 13 02:33:30.934975 kernel: FS-Cache: Loaded Dec 13 02:33:30.910000 audit[3186]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5642a34209c0 a1=4c0fc a2=5642962a72b0 a3=5 items=0 ppid=485 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:30.910000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.960605 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.960631 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.961297 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.961977 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.963293 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.963318 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.963980 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.965306 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.965332 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.966003 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.966840 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.968843 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.968870 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.970318 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.970340 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.971138 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.971856 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.972841 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.974201 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.974227 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.974896 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.976237 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.976263 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.977102 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.978427 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.978452 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.979125 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.979851 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.981165 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.981191 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.981857 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.983174 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.983924 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.983943 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.985326 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.985348 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.986059 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.987390 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.987415 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.988079 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.989390 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.989416 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.990072 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.991430 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.991451 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.992121 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.993436 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.993461 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.994116 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.995433 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.995458 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.996120 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.997440 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.997461 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.998120 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.999431 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.999453 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.000130 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.000839 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.002119 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.002149 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.002854 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.004145 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.004170 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.004860 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.006134 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.006158 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.006847 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.008136 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.008163 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.008853 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.010261 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.010283 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.010980 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.012347 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.012370 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.013040 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.014348 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.014373 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.015030 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.016344 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.016369 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.017049 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.018374 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.018395 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.019101 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.019841 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.021131 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.021158 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.021844 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.023128 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.023149 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.023840 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.025095 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.025116 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.025131 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.026347 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.026999 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.027026 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.028239 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.028267 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.030102 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.030121 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.030139 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.031337 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.031963 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.033192 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.033218 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.033237 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.034421 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.035047 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.035072 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.036305 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.036333 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.038243 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.038271 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.038284 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.040123 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.040150 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.040167 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.041364 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.041989 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.043223 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.043251 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.043270 kernel: Failed to create system directory sunrpc Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:30.951000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.044844 kernel: Failed to create system directory sunrpc Dec 13 02:33:31.051243 kernel: RPC: Registered named UNIX socket transport module. Dec 13 02:33:31.051278 kernel: RPC: Registered udp transport module. Dec 13 02:33:31.051293 kernel: RPC: Registered tcp transport module. Dec 13 02:33:31.051307 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 02:33:30.951000 audit[3186]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5642a346cad0 a1=1a7f1c a2=5642962a72b0 a3=5 items=6 ppid=485 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:30.951000 audit: CWD cwd="/" Dec 13 02:33:30.951000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:33:30.951000 audit: PATH item=1 name=(null) inode=34494 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:33:30.951000 audit: PATH item=2 name=(null) inode=34494 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:33:30.951000 audit: PATH item=3 name=(null) inode=34495 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:33:30.951000 audit: PATH item=4 name=(null) inode=34494 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:33:30.951000 audit: PATH item=5 name=(null) inode=34496 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:33:30.951000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.080400 kernel: Failed to create system directory nfs Dec 13 02:33:31.080426 kernel: Failed to create system directory nfs Dec 13 02:33:31.080442 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.082173 kernel: Failed to create system directory nfs Dec 13 02:33:31.082267 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.083433 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.085879 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.088376 kernel: Failed to create system directory nfs Dec 13 02:33:31.088402 kernel: Failed to create system directory nfs Dec 13 02:33:31.088416 kernel: Failed to create system directory nfs Dec 13 02:33:31.088455 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.090099 kernel: Failed to create system directory nfs Dec 13 02:33:31.090130 kernel: Failed to create system directory nfs Dec 13 02:33:31.090151 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.091245 kernel: Failed to create system directory nfs Dec 13 02:33:31.091270 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.092381 kernel: Failed to create system directory nfs Dec 13 02:33:31.092406 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.092936 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.094102 kernel: Failed to create system directory nfs Dec 13 02:33:31.094127 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.095243 kernel: Failed to create system directory nfs Dec 13 02:33:31.095275 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.096376 kernel: Failed to create system directory nfs Dec 13 02:33:31.096401 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.097082 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.098099 kernel: Failed to create system directory nfs Dec 13 02:33:31.098124 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.099233 kernel: Failed to create system directory nfs Dec 13 02:33:31.099254 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.100365 kernel: Failed to create system directory nfs Dec 13 02:33:31.100391 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.102089 kernel: Failed to create system directory nfs Dec 13 02:33:31.102113 kernel: Failed to create system directory nfs Dec 13 02:33:31.102127 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.103234 kernel: Failed to create system directory nfs Dec 13 02:33:31.103262 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.104429 kernel: Failed to create system directory nfs Dec 13 02:33:31.104454 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.106163 kernel: Failed to create system directory nfs Dec 13 02:33:31.106187 kernel: Failed to create system directory nfs Dec 13 02:33:31.106201 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.107324 kernel: Failed to create system directory nfs Dec 13 02:33:31.107349 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.109025 kernel: Failed to create system directory nfs Dec 13 02:33:31.109050 kernel: Failed to create system directory nfs Dec 13 02:33:31.109065 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.110169 kernel: Failed to create system directory nfs Dec 13 02:33:31.110196 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.111307 kernel: Failed to create system directory nfs Dec 13 02:33:31.111332 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.113018 kernel: Failed to create system directory nfs Dec 13 02:33:31.113044 kernel: Failed to create system directory nfs Dec 13 02:33:31.113061 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.114155 kernel: Failed to create system directory nfs Dec 13 02:33:31.114179 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.115298 kernel: Failed to create system directory nfs Dec 13 02:33:31.115325 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.073000 audit[3186]: AVC avc: denied { confidentiality } for pid=3186 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.117043 kernel: Failed to create system directory nfs Dec 13 02:33:31.117144 kernel: Failed to create system directory nfs Dec 13 02:33:31.073000 audit[3186]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5642a368d700 a1=16e97c a2=5642962a72b0 a3=5 items=0 ppid=485 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.073000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 02:33:31.134885 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.163943 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.163984 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.165078 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.165103 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.166252 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.166276 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.167433 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.167461 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.168052 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.169249 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.169274 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.169870 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.171254 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.171287 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.172440 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.172464 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.174215 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.174240 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.174254 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.175382 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.175408 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.177174 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.177198 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.177210 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.178385 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.178410 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.180148 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.180179 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.180195 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.181324 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.181352 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.183084 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.183115 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.183137 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.184242 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.184266 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.185412 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.185438 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.186011 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.187214 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.187241 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.188376 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.188401 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.188972 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.190176 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.190204 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.191346 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.191371 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.193114 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.193138 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.193152 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.194283 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.194307 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.196050 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.196074 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.196088 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.197213 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.197251 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.198412 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.198438 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.200186 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.200210 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.200224 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.201360 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.201384 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.203121 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.203145 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.203158 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.204309 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.204329 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.206310 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.206342 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.206358 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.206937 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.208119 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.208144 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.209284 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.209304 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.209875 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.211053 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.211080 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.212223 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.212248 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.213391 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.213416 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.215195 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.215221 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.215235 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.216370 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.216393 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.218149 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.218169 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.218185 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.154000 audit[3192]: AVC avc: denied { confidentiality } for pid=3192 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.219309 kernel: Failed to create system directory nfs4 Dec 13 02:33:31.314148 kernel: NFS: Registering the id_resolver key type Dec 13 02:33:31.314214 kernel: Key type id_resolver registered Dec 13 02:33:31.314230 kernel: Key type id_legacy registered Dec 13 02:33:31.154000 audit[3192]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2a5b2c7010 a1=208de4 a2=562c985062b0 a3=5 items=0 ppid=485 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.154000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.324089 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.324120 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.325448 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.325474 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.326137 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.327430 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.327455 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.328108 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.329406 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.329431 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.330096 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.331420 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.331445 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.332104 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.333404 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.333424 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.334080 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.335386 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.335410 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.336065 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.337368 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.337391 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.338062 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.339483 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.339522 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.340308 kernel: Failed to create system directory rpcgss Dec 13 02:33:31.320000 audit[3193]: AVC avc: denied { confidentiality } for pid=3193 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:33:31.320000 audit[3193]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f46b34c7010 a1=70af4 a2=56173299b2b0 a3=5 items=0 ppid=485 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.320000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 02:33:31.353813 nfsidmap[3202]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 02:33:31.354846 nfsidmap[3203]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 02:33:31.363000 audit[1379]: AVC avc: denied { watch_reads } for pid=1379 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:33:31.363000 audit[1379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b754df0950 a2=10 a3=c60c309b79bfb47d items=0 ppid=1 pid=1379 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.363000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:33:31.363000 audit[1379]: AVC avc: denied { watch_reads } for pid=1379 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:33:31.363000 audit[1379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b754df0950 a2=10 a3=c60c309b79bfb47d items=0 ppid=1 pid=1379 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.363000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:33:31.363000 audit[1379]: AVC avc: denied { watch_reads } for pid=1379 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:33:31.363000 audit[1379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b754df0950 a2=10 a3=c60c309b79bfb47d items=0 ppid=1 pid=1379 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.363000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 02:33:31.363000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:33:31.363000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:33:31.363000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 02:33:31.537573 env[1264]: time="2024-12-13T02:33:31.534008950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fada0cd5-976b-4919-9a1c-3ae023f04f7c,Namespace:default,Attempt:0,}" Dec 13 02:33:31.618060 systemd-networkd[1081]: cali5ec59c6bf6e: Link UP Dec 13 02:33:31.620279 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:33:31.620618 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 02:33:31.620364 systemd-networkd[1081]: cali5ec59c6bf6e: Gained carrier Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.564 [INFO][3204] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.132-k8s-test--pod--1-eth0 default fada0cd5-976b-4919-9a1c-3ae023f04f7c 1291 0 2024-12-13 02:33:16 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.132 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.564 [INFO][3204] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-eth0" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.583 [INFO][3216] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" HandleID="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Workload="10.67.124.132-k8s-test--pod--1-eth0" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.593 [INFO][3216] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" HandleID="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Workload="10.67.124.132-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bc4f0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.132", "pod":"test-pod-1", "timestamp":"2024-12-13 02:33:31.583910426 +0000 UTC"}, Hostname:"10.67.124.132", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.593 [INFO][3216] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.593 [INFO][3216] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.593 [INFO][3216] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.132' Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.594 [INFO][3216] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.595 [INFO][3216] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.597 [INFO][3216] ipam/ipam.go 489: Trying affinity for 192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.598 [INFO][3216] ipam/ipam.go 155: Attempting to load block cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.599 [INFO][3216] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.14.0/26 host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.599 [INFO][3216] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.14.0/26 handle="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.600 [INFO][3216] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8 Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.602 [INFO][3216] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.14.0/26 handle="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.612 [INFO][3216] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.14.4/26] block=192.168.14.0/26 handle="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.612 [INFO][3216] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.14.4/26] handle="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" host="10.67.124.132" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.612 [INFO][3216] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.612 [INFO][3216] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.14.4/26] IPv6=[] ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" HandleID="k8s-pod-network.cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Workload="10.67.124.132-k8s-test--pod--1-eth0" Dec 13 02:33:31.632787 env[1264]: 2024-12-13 02:33:31.613 [INFO][3204] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fada0cd5-976b-4919-9a1c-3ae023f04f7c", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 33, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:31.633315 env[1264]: 2024-12-13 02:33:31.613 [INFO][3204] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.14.4/32] ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-eth0" Dec 13 02:33:31.633315 env[1264]: 2024-12-13 02:33:31.614 [INFO][3204] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-eth0" Dec 13 02:33:31.633315 env[1264]: 2024-12-13 02:33:31.620 [INFO][3204] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-eth0" Dec 13 02:33:31.633315 env[1264]: 2024-12-13 02:33:31.620 [INFO][3204] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.132-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fada0cd5-976b-4919-9a1c-3ae023f04f7c", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 33, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.132", ContainerID:"cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.14.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"b2:e0:03:b8:37:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:31.633315 env[1264]: 2024-12-13 02:33:31.631 [INFO][3204] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.132-k8s-test--pod--1-eth0" Dec 13 02:33:31.637974 kubelet[1620]: E1213 02:33:31.637949 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:31.644989 env[1264]: time="2024-12-13T02:33:31.642977952Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:33:31.644989 env[1264]: time="2024-12-13T02:33:31.643009478Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:33:31.644989 env[1264]: time="2024-12-13T02:33:31.643016927Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:33:31.644989 env[1264]: time="2024-12-13T02:33:31.644886818Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8 pid=3238 runtime=io.containerd.runc.v2 Dec 13 02:33:31.647000 audit[3250]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=3250 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:33:31.647000 audit[3250]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffed4c2a460 a2=0 a3=7ffed4c2a44c items=0 ppid=2332 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.647000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:33:31.654560 systemd[1]: Started cri-containerd-cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8.scope. Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.669000 audit: BPF prog-id=126 op=LOAD Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3238 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364356531643035383633346465303830366432643032666133626136 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3238 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364356531643035383633346465303830366432643032666133626136 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit: BPF prog-id=127 op=LOAD Dec 13 02:33:31.670000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6e40 items=0 ppid=3238 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364356531643035383633346465303830366432643032666133626136 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit: BPF prog-id=128 op=LOAD Dec 13 02:33:31.670000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6e88 items=0 ppid=3238 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364356531643035383633346465303830366432643032666133626136 Dec 13 02:33:31.670000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:33:31.670000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:31.670000 audit: BPF prog-id=129 op=LOAD Dec 13 02:33:31.670000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c7298 items=0 ppid=3238 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:31.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364356531643035383633346465303830366432643032666133626136 Dec 13 02:33:31.671653 systemd-resolved[1214]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:33:31.692491 env[1264]: time="2024-12-13T02:33:31.692468181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fada0cd5-976b-4919-9a1c-3ae023f04f7c,Namespace:default,Attempt:0,} returns sandbox id \"cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8\"" Dec 13 02:33:31.693511 env[1264]: time="2024-12-13T02:33:31.693500323Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 02:33:32.050992 env[1264]: time="2024-12-13T02:33:32.050962562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:32.051646 env[1264]: time="2024-12-13T02:33:32.051629160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:32.052691 env[1264]: time="2024-12-13T02:33:32.052675489Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:32.054294 env[1264]: time="2024-12-13T02:33:32.054274948Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:33:32.054753 env[1264]: time="2024-12-13T02:33:32.054737510Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 02:33:32.056316 env[1264]: time="2024-12-13T02:33:32.056301880Z" level=info msg="CreateContainer within sandbox \"cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 02:33:32.067256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3615654368.mount: Deactivated successfully. Dec 13 02:33:32.070621 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount47915153.mount: Deactivated successfully. Dec 13 02:33:32.072605 env[1264]: time="2024-12-13T02:33:32.072579140Z" level=info msg="CreateContainer within sandbox \"cd5e1d058634de0806d2d02fa3ba659f8c2cf62c869c1357b44af7fd516439d8\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"47de5d1164a8e82b2953042085ccf2ea6a88eeedaa0f1399d5dc3196dd150f9c\"" Dec 13 02:33:32.073001 env[1264]: time="2024-12-13T02:33:32.072987403Z" level=info msg="StartContainer for \"47de5d1164a8e82b2953042085ccf2ea6a88eeedaa0f1399d5dc3196dd150f9c\"" Dec 13 02:33:32.082939 systemd[1]: Started cri-containerd-47de5d1164a8e82b2953042085ccf2ea6a88eeedaa0f1399d5dc3196dd150f9c.scope. Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit: BPF prog-id=130 op=LOAD Dec 13 02:33:32.091000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.091000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3238 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:32.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646535643131363461386538326232393533303432303835636366 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3238 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:32.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646535643131363461386538326232393533303432303835636366 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit: BPF prog-id=131 op=LOAD Dec 13 02:33:32.092000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026bdc0 items=0 ppid=3238 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:32.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646535643131363461386538326232393533303432303835636366 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.092000 audit: BPF prog-id=132 op=LOAD Dec 13 02:33:32.092000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026be08 items=0 ppid=3238 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:32.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646535643131363461386538326232393533303432303835636366 Dec 13 02:33:32.093000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:33:32.093000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:33:32.093000 audit: BPF prog-id=133 op=LOAD Dec 13 02:33:32.093000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000352218 items=0 ppid=3238 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:32.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646535643131363461386538326232393533303432303835636366 Dec 13 02:33:32.101949 env[1264]: time="2024-12-13T02:33:32.101922312Z" level=info msg="StartContainer for \"47de5d1164a8e82b2953042085ccf2ea6a88eeedaa0f1399d5dc3196dd150f9c\" returns successfully" Dec 13 02:33:32.638899 kubelet[1620]: E1213 02:33:32.638873 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:32.937942 systemd-networkd[1081]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 02:33:33.639734 kubelet[1620]: E1213 02:33:33.639711 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:34.640872 kubelet[1620]: E1213 02:33:34.640845 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:35.217882 systemd[1]: run-containerd-runc-k8s.io-568474068e86d27e6520a24b2dd0c044f369c5252bcdd4c6939e5bbc4d122112-runc.HR8TSU.mount: Deactivated successfully. Dec 13 02:33:35.641879 kubelet[1620]: E1213 02:33:35.641807 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:36.642006 kubelet[1620]: E1213 02:33:36.641973 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 02:33:37.643057 kubelet[1620]: E1213 02:33:37.643027 1620 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"