Dec 13 14:24:53.649372 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:24:53.649388 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:53.649394 kernel: Disabled fast string operations Dec 13 14:24:53.649398 kernel: BIOS-provided physical RAM map: Dec 13 14:24:53.649401 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 14:24:53.649405 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 14:24:53.649410 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 14:24:53.649414 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 14:24:53.649418 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 14:24:53.649422 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 14:24:53.649426 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 14:24:53.649430 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 14:24:53.649434 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 14:24:53.649437 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 14:24:53.649444 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 14:24:53.649448 kernel: NX (Execute Disable) protection: active Dec 13 14:24:53.649452 kernel: SMBIOS 2.7 present. Dec 13 14:24:53.649456 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 14:24:53.649461 kernel: vmware: hypercall mode: 0x00 Dec 13 14:24:53.649539 kernel: Hypervisor detected: VMware Dec 13 14:24:53.649551 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 14:24:53.649555 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 14:24:53.649559 kernel: vmware: using clock offset of 5732694590 ns Dec 13 14:24:53.649564 kernel: tsc: Detected 3408.000 MHz processor Dec 13 14:24:53.649568 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:24:53.649573 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:24:53.649578 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 14:24:53.649582 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:24:53.649587 kernel: total RAM covered: 3072M Dec 13 14:24:53.649592 kernel: Found optimal setting for mtrr clean up Dec 13 14:24:53.649597 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 14:24:53.649616 kernel: Using GB pages for direct mapping Dec 13 14:24:53.649620 kernel: ACPI: Early table checksum verification disabled Dec 13 14:24:53.649624 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 14:24:53.649628 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 14:24:53.649633 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 14:24:53.649637 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 14:24:53.649642 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:24:53.649646 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:24:53.649651 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 14:24:53.649657 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 14:24:53.649662 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 14:24:53.649667 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 14:24:53.649671 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 14:24:53.649677 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 14:24:53.649682 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 14:24:53.649687 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 14:24:53.649691 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:24:53.649696 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:24:53.649700 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 14:24:53.649705 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 14:24:53.649710 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 14:24:53.649714 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 14:24:53.649720 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 14:24:53.649725 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 14:24:53.649729 kernel: system APIC only can use physical flat Dec 13 14:24:53.649734 kernel: Setting APIC routing to physical flat. Dec 13 14:24:53.649738 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:24:53.649743 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 14:24:53.649748 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 14:24:53.649752 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 14:24:53.649757 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 14:24:53.649762 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 14:24:53.649767 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 14:24:53.649771 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 14:24:53.649776 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 14:24:53.649780 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 14:24:53.649785 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 14:24:53.649790 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 14:24:53.649794 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 14:24:53.649799 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 14:24:53.649804 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 14:24:53.649809 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 14:24:53.649813 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 14:24:53.649818 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 14:24:53.649823 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 14:24:53.649827 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 14:24:53.649832 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 14:24:53.649836 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 14:24:53.649841 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 14:24:53.649846 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 14:24:53.649850 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 14:24:53.649855 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 14:24:53.649860 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 14:24:53.649865 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 14:24:53.649869 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 14:24:53.649874 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 14:24:53.649878 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 14:24:53.649883 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 14:24:53.649888 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 14:24:53.649892 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 14:24:53.649897 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 14:24:53.649902 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 14:24:53.649907 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 14:24:53.649911 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 14:24:53.649916 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 14:24:53.649920 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 14:24:53.649925 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 14:24:53.649930 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 14:24:53.649934 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 14:24:53.649939 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 14:24:53.649943 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 14:24:53.649949 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 14:24:53.649953 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 14:24:53.649958 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 14:24:53.649962 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 14:24:53.649967 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 14:24:53.649971 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 14:24:53.649976 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 14:24:53.649980 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 14:24:53.649985 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 14:24:53.649989 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 14:24:53.649995 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 14:24:53.649999 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 14:24:53.650004 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 14:24:53.650009 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 14:24:53.650013 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 14:24:53.650018 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 14:24:53.650027 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 14:24:53.650032 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 14:24:53.650037 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 14:24:53.650042 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 14:24:53.650047 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 14:24:53.650052 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 14:24:53.650057 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 14:24:53.650062 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 14:24:53.650067 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 14:24:53.650072 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 14:24:53.650077 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 14:24:53.650082 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 14:24:53.650087 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 14:24:53.650093 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 14:24:53.650097 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 14:24:53.650102 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 14:24:53.650107 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 14:24:53.650112 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 14:24:53.650117 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 14:24:53.650122 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 14:24:53.650127 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 14:24:53.650132 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 14:24:53.650138 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 14:24:53.650143 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 14:24:53.650148 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 14:24:53.650152 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 14:24:53.650157 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 14:24:53.650162 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 14:24:53.650167 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 14:24:53.650172 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 14:24:53.650177 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 14:24:53.650183 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 14:24:53.650188 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 14:24:53.650193 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 14:24:53.650198 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 14:24:53.650203 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 14:24:53.650208 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 14:24:53.650212 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 14:24:53.650217 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 14:24:53.650222 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 14:24:53.650227 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 14:24:53.650233 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 14:24:53.650238 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 14:24:53.650243 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 14:24:53.650247 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 14:24:53.650252 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 14:24:53.650257 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 14:24:53.650262 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 14:24:53.650267 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 14:24:53.650272 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 14:24:53.650277 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 14:24:53.650283 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 14:24:53.650288 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 14:24:53.650293 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 14:24:53.650297 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 14:24:53.650302 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 14:24:53.650307 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 14:24:53.650312 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 14:24:53.650317 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 14:24:53.650322 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 14:24:53.650327 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 14:24:53.650332 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 14:24:53.650337 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 14:24:53.650342 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 14:24:53.650347 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 14:24:53.650352 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 14:24:53.650357 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 14:24:53.650362 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:24:53.650367 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 14:24:53.650372 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 14:24:53.650378 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 14:24:53.650383 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 14:24:53.650389 kernel: Zone ranges: Dec 13 14:24:53.650394 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:24:53.650399 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 14:24:53.650404 kernel: Normal empty Dec 13 14:24:53.650409 kernel: Movable zone start for each node Dec 13 14:24:53.650414 kernel: Early memory node ranges Dec 13 14:24:53.650418 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 14:24:53.650423 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 14:24:53.650429 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 14:24:53.650434 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 14:24:53.650439 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:24:53.650444 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 14:24:53.650449 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 14:24:53.650454 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 14:24:53.650459 kernel: system APIC only can use physical flat Dec 13 14:24:53.650464 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 14:24:53.650487 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 14:24:53.650493 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 14:24:53.650498 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 14:24:53.650503 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 14:24:53.650508 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 14:24:53.650513 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 14:24:53.650518 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 14:24:53.650523 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 14:24:53.650528 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 14:24:53.650532 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 14:24:53.650538 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 14:24:53.650543 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 14:24:53.650548 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 14:24:53.650553 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 14:24:53.650558 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 14:24:53.650563 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 14:24:53.650568 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 14:24:53.650573 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 14:24:53.650578 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 14:24:53.650583 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 14:24:53.650589 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 14:24:53.650593 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 14:24:53.650598 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 14:24:53.650603 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 14:24:53.650608 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 14:24:53.650613 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 14:24:53.650618 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 14:24:53.650623 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 14:24:53.650628 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 14:24:53.650633 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 14:24:53.650638 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 14:24:53.650644 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 14:24:53.650649 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 14:24:53.650653 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 14:24:53.650658 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 14:24:53.650663 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 14:24:53.650668 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 14:24:53.650673 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 14:24:53.650678 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 14:24:53.650684 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 14:24:53.650689 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 14:24:53.650694 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 14:24:53.650699 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 14:24:53.650704 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 14:24:53.650708 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 14:24:53.650713 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 14:24:53.650718 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 14:24:53.650723 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 14:24:53.650728 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 14:24:53.650734 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 14:24:53.650739 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 14:24:53.650744 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 14:24:53.650749 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 14:24:53.650754 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 14:24:53.650759 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 14:24:53.650764 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 14:24:53.650769 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 14:24:53.650774 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 14:24:53.650780 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 14:24:53.650785 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 14:24:53.650790 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 14:24:53.650795 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 14:24:53.650800 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 14:24:53.650805 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 14:24:53.650810 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 14:24:53.650815 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 14:24:53.650820 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 14:24:53.650825 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 14:24:53.650831 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 14:24:53.650836 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 14:24:53.650841 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 14:24:53.650846 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 14:24:53.650850 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 14:24:53.650855 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 14:24:53.650860 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 14:24:53.650865 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 14:24:53.650870 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 14:24:53.650876 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 14:24:53.650881 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 14:24:53.650886 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 14:24:53.650890 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 14:24:53.650895 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 14:24:53.650900 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 14:24:53.650905 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 14:24:53.650910 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 14:24:53.650915 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 14:24:53.650921 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 14:24:53.650926 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 14:24:53.650931 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 14:24:53.650936 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 14:24:53.650941 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 14:24:53.650945 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 14:24:53.650950 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 14:24:53.650955 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 14:24:53.650960 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 14:24:53.650966 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 14:24:53.650971 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 14:24:53.650976 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 14:24:53.650981 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 14:24:53.650986 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 14:24:53.650991 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 14:24:53.650996 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 14:24:53.651001 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 14:24:53.651006 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 14:24:53.651011 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 14:24:53.651017 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 14:24:53.651022 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 14:24:53.651027 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 14:24:53.651031 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 14:24:53.651036 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 14:24:53.651041 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 14:24:53.651046 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 14:24:53.651051 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 14:24:53.651056 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 14:24:53.651061 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 14:24:53.651067 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 14:24:53.651072 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 14:24:53.651077 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 14:24:53.651082 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 14:24:53.651087 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 14:24:53.651092 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 14:24:53.651097 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 14:24:53.651102 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 14:24:53.651107 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 14:24:53.651112 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 14:24:53.651117 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 14:24:53.651122 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 14:24:53.651127 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:24:53.651133 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 14:24:53.651138 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:24:53.651143 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 14:24:53.651147 kernel: TSC deadline timer available Dec 13 14:24:53.651153 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 14:24:53.651158 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 14:24:53.651164 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 14:24:53.651169 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:24:53.651174 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 14:24:53.651179 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 14:24:53.651184 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 14:24:53.651189 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 14:24:53.651195 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 14:24:53.651200 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 14:24:53.651206 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 14:24:53.651211 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 14:24:53.651215 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 14:24:53.651220 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 14:24:53.651231 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 14:24:53.651238 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 14:24:53.651243 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 14:24:53.651248 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 14:24:53.651253 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 14:24:53.651259 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 14:24:53.651265 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 14:24:53.651270 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 14:24:53.651275 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 14:24:53.651280 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 14:24:53.651285 kernel: Policy zone: DMA32 Dec 13 14:24:53.651291 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:53.651297 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:24:53.651303 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 14:24:53.651309 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 14:24:53.651314 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 14:24:53.651319 kernel: printk: log_buf_len: 1048576 bytes Dec 13 14:24:53.651325 kernel: printk: early log buf free: 239728(91%) Dec 13 14:24:53.651330 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:24:53.651335 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:24:53.651341 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:24:53.651346 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 155976K reserved, 0K cma-reserved) Dec 13 14:24:53.651353 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 14:24:53.651358 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:24:53.651363 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:24:53.651370 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:24:53.651375 kernel: rcu: RCU event tracing is enabled. Dec 13 14:24:53.651380 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 14:24:53.651387 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:24:53.651393 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:24:53.651398 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:24:53.651404 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 14:24:53.651409 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 14:24:53.651414 kernel: random: crng init done Dec 13 14:24:53.651420 kernel: Console: colour VGA+ 80x25 Dec 13 14:24:53.651425 kernel: printk: console [tty0] enabled Dec 13 14:24:53.651431 kernel: printk: console [ttyS0] enabled Dec 13 14:24:53.651437 kernel: ACPI: Core revision 20210730 Dec 13 14:24:53.651442 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 14:24:53.651448 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:24:53.651453 kernel: x2apic enabled Dec 13 14:24:53.651459 kernel: Switched APIC routing to physical x2apic. Dec 13 14:24:53.651464 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:24:53.651476 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:24:53.651481 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 14:24:53.651486 kernel: Disabled fast string operations Dec 13 14:24:53.651493 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:24:53.651498 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:24:53.651504 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:24:53.651518 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 14:24:53.651524 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:24:53.651529 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:24:53.651535 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 14:24:53.651540 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:24:53.651546 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 14:24:53.651552 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 14:24:53.651557 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:24:53.651563 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:24:53.651568 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:24:53.651574 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 14:24:53.651579 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:24:53.651585 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:24:53.651590 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:24:53.651595 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:24:53.651602 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:24:53.651607 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 14:24:53.651613 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:24:53.651618 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 14:24:53.651624 kernel: LSM: Security Framework initializing Dec 13 14:24:53.651629 kernel: SELinux: Initializing. Dec 13 14:24:53.651635 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:24:53.651640 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:24:53.651646 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 14:24:53.651652 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 14:24:53.651658 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 14:24:53.651663 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 14:24:53.651668 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 14:24:53.651673 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 14:24:53.651679 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 14:24:53.651684 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 14:24:53.651689 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 14:24:53.651696 kernel: ... version: 1 Dec 13 14:24:53.651701 kernel: ... bit width: 48 Dec 13 14:24:53.651706 kernel: ... generic registers: 4 Dec 13 14:24:53.651711 kernel: ... value mask: 0000ffffffffffff Dec 13 14:24:53.651717 kernel: ... max period: 000000007fffffff Dec 13 14:24:53.651722 kernel: ... fixed-purpose events: 0 Dec 13 14:24:53.651728 kernel: ... event mask: 000000000000000f Dec 13 14:24:53.651733 kernel: signal: max sigframe size: 1776 Dec 13 14:24:53.651739 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:24:53.651745 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:24:53.651750 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:24:53.651756 kernel: x86: Booting SMP configuration: Dec 13 14:24:53.651761 kernel: .... node #0, CPUs: #1 Dec 13 14:24:53.651766 kernel: Disabled fast string operations Dec 13 14:24:53.651773 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 14:24:53.651778 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 14:24:53.651783 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:24:53.651789 kernel: smpboot: Max logical packages: 128 Dec 13 14:24:53.651794 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 14:24:53.651800 kernel: devtmpfs: initialized Dec 13 14:24:53.651806 kernel: x86/mm: Memory block size: 128MB Dec 13 14:24:53.651811 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 14:24:53.651816 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:24:53.651822 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 14:24:53.651827 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:24:53.651833 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:24:53.651838 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:24:53.651846 kernel: audit: type=2000 audit(1734099892.059:1): state=initialized audit_enabled=0 res=1 Dec 13 14:24:53.651856 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:24:53.651862 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:24:53.651867 kernel: cpuidle: using governor menu Dec 13 14:24:53.651873 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 14:24:53.651878 kernel: ACPI: bus type PCI registered Dec 13 14:24:53.651883 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:24:53.651889 kernel: dca service started, version 1.12.1 Dec 13 14:24:53.651894 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 14:24:53.651900 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 14:24:53.651906 kernel: PCI: Using configuration type 1 for base access Dec 13 14:24:53.651912 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:24:53.651917 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:24:53.651922 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:24:53.651928 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:24:53.651933 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:24:53.651938 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:24:53.651944 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:24:53.651949 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:24:53.651955 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:24:53.651961 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:24:53.651966 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:24:53.651972 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 14:24:53.651977 kernel: ACPI: Interpreter enabled Dec 13 14:24:53.651982 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 14:24:53.651987 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:24:53.651993 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:24:53.651998 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 14:24:53.652004 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 14:24:53.652078 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:24:53.652126 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 14:24:53.652170 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 14:24:53.652178 kernel: PCI host bridge to bus 0000:00 Dec 13 14:24:53.652223 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:24:53.652264 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 14:24:53.660530 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 14:24:53.660606 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 14:24:53.660650 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 14:24:53.660692 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:24:53.660733 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:24:53.660773 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 14:24:53.660812 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 14:24:53.660871 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 14:24:53.660923 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 14:24:53.660975 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 14:24:53.661027 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 14:24:53.661076 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 14:24:53.661123 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:24:53.661171 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:24:53.661216 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:24:53.661262 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:24:53.661313 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 14:24:53.661360 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 14:24:53.661406 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 14:24:53.661459 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 14:24:53.662580 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 14:24:53.662634 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 14:24:53.662688 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 14:24:53.662737 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 14:24:53.662784 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 14:24:53.662830 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 14:24:53.662880 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 14:24:53.662926 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:24:53.662976 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 14:24:53.663030 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663077 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663131 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663180 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663234 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663281 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663331 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663379 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663429 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663485 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663540 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663587 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663637 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663685 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663735 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663782 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663835 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663881 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.663931 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.663978 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664027 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664076 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664131 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664180 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664231 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664277 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664332 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664379 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664432 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664488 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664537 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664584 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664633 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664680 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664733 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664779 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664829 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664876 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.664925 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.664971 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665023 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665070 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665120 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665166 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665219 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665272 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665329 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665376 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665426 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665486 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665545 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665592 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665641 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665693 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665742 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665788 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665840 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665887 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.665938 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.665987 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.666041 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.666088 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.666137 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:24:53.666184 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.666234 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 14:24:53.666285 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:24:53.666333 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 14:24:53.666342 kernel: acpiphp: Slot [32] registered Dec 13 14:24:53.666348 kernel: acpiphp: Slot [33] registered Dec 13 14:24:53.666354 kernel: acpiphp: Slot [34] registered Dec 13 14:24:53.666359 kernel: acpiphp: Slot [35] registered Dec 13 14:24:53.666365 kernel: acpiphp: Slot [36] registered Dec 13 14:24:53.666370 kernel: acpiphp: Slot [37] registered Dec 13 14:24:53.666378 kernel: acpiphp: Slot [38] registered Dec 13 14:24:53.666383 kernel: acpiphp: Slot [39] registered Dec 13 14:24:53.666389 kernel: acpiphp: Slot [40] registered Dec 13 14:24:53.666395 kernel: acpiphp: Slot [41] registered Dec 13 14:24:53.666400 kernel: acpiphp: Slot [42] registered Dec 13 14:24:53.666406 kernel: acpiphp: Slot [43] registered Dec 13 14:24:53.666412 kernel: acpiphp: Slot [44] registered Dec 13 14:24:53.666417 kernel: acpiphp: Slot [45] registered Dec 13 14:24:53.666423 kernel: acpiphp: Slot [46] registered Dec 13 14:24:53.666428 kernel: acpiphp: Slot [47] registered Dec 13 14:24:53.666435 kernel: acpiphp: Slot [48] registered Dec 13 14:24:53.666440 kernel: acpiphp: Slot [49] registered Dec 13 14:24:53.666446 kernel: acpiphp: Slot [50] registered Dec 13 14:24:53.666452 kernel: acpiphp: Slot [51] registered Dec 13 14:24:53.666457 kernel: acpiphp: Slot [52] registered Dec 13 14:24:53.666463 kernel: acpiphp: Slot [53] registered Dec 13 14:24:53.676498 kernel: acpiphp: Slot [54] registered Dec 13 14:24:53.676511 kernel: acpiphp: Slot [55] registered Dec 13 14:24:53.676518 kernel: acpiphp: Slot [56] registered Dec 13 14:24:53.676526 kernel: acpiphp: Slot [57] registered Dec 13 14:24:53.676532 kernel: acpiphp: Slot [58] registered Dec 13 14:24:53.676538 kernel: acpiphp: Slot [59] registered Dec 13 14:24:53.676544 kernel: acpiphp: Slot [60] registered Dec 13 14:24:53.676549 kernel: acpiphp: Slot [61] registered Dec 13 14:24:53.676555 kernel: acpiphp: Slot [62] registered Dec 13 14:24:53.676561 kernel: acpiphp: Slot [63] registered Dec 13 14:24:53.676637 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 14:24:53.676688 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:24:53.676738 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:24:53.676784 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:24:53.676829 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 14:24:53.676876 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 14:24:53.676921 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 14:24:53.676966 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 14:24:53.677022 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 14:24:53.677071 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 14:24:53.677117 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 14:24:53.677162 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 14:24:53.677214 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 14:24:53.677263 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 14:24:53.677311 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 14:24:53.677359 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:24:53.677407 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 14:24:53.677456 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:24:53.677520 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:24:53.677569 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:24:53.677616 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:24:53.677665 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:24:53.677712 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:24:53.677758 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:24:53.677805 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:24:53.677857 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:24:53.677904 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:24:53.677950 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:24:53.678004 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:24:53.678054 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:24:53.678099 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:24:53.678145 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:24:53.678195 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:24:53.678241 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:24:53.678287 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:24:53.678335 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:24:53.678382 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:24:53.678428 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:24:53.679547 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:24:53.679606 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:24:53.679655 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:24:53.679705 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:24:53.679752 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:24:53.679798 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:24:53.679854 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 14:24:53.679903 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 14:24:53.679950 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 14:24:53.679997 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 14:24:53.680044 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 14:24:53.680098 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:24:53.680146 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 14:24:53.680192 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:24:53.680242 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:24:53.680289 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:24:53.680334 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:24:53.680379 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:24:53.680426 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:24:53.680479 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:24:53.680525 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:24:53.680571 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:24:53.680620 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:24:53.680666 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:24:53.680711 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:24:53.680756 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:24:53.680804 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:24:53.680849 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:24:53.680895 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:24:53.680945 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:24:53.680991 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:24:53.681037 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:24:53.681085 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:24:53.681131 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:24:53.681176 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:24:53.681223 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:24:53.681268 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:24:53.681316 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:24:53.681363 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:24:53.681408 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:24:53.681453 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:24:53.685556 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:24:53.685619 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:24:53.685671 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:24:53.685720 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:24:53.685775 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:24:53.685824 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:24:53.685871 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:24:53.685918 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:24:53.685968 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:24:53.686016 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:24:53.686063 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:24:53.686109 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:24:53.686161 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:24:53.686208 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:24:53.686255 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:24:53.686302 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:24:53.686350 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:24:53.686396 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:24:53.686443 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:24:53.686507 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:24:53.686556 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:24:53.686604 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:24:53.686651 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:24:53.686697 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:24:53.686745 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:24:53.686792 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:24:53.686839 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:24:53.686890 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:24:53.686938 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:24:53.686984 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:24:53.687032 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:24:53.687080 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:24:53.687127 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:24:53.687173 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:24:53.687219 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:24:53.687269 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:24:53.687317 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:24:53.687362 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:24:53.687410 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:24:53.687457 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:24:53.687511 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:24:53.687559 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:24:53.687606 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:24:53.687655 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:24:53.687704 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:24:53.687751 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:24:53.687797 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:24:53.687846 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:24:53.687892 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:24:53.687939 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:24:53.687988 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:24:53.688037 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:24:53.688083 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:24:53.688092 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 14:24:53.688098 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 14:24:53.688104 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 14:24:53.688110 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:24:53.688115 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 14:24:53.688121 kernel: iommu: Default domain type: Translated Dec 13 14:24:53.688127 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:24:53.688177 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 14:24:53.688223 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:24:53.688269 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 14:24:53.688278 kernel: vgaarb: loaded Dec 13 14:24:53.688284 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:24:53.688290 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:24:53.688295 kernel: PTP clock support registered Dec 13 14:24:53.688301 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:24:53.688309 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:24:53.688315 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 14:24:53.688320 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 14:24:53.688326 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 14:24:53.688332 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 14:24:53.688338 kernel: clocksource: Switched to clocksource tsc-early Dec 13 14:24:53.688344 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:24:53.688350 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:24:53.688355 kernel: pnp: PnP ACPI init Dec 13 14:24:53.688406 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 14:24:53.688454 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 14:24:53.688514 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 14:24:53.688566 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 14:24:53.688615 kernel: pnp 00:06: [dma 2] Dec 13 14:24:53.688666 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 14:24:53.688710 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 14:24:53.688755 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 14:24:53.688763 kernel: pnp: PnP ACPI: found 8 devices Dec 13 14:24:53.688770 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:24:53.688776 kernel: NET: Registered PF_INET protocol family Dec 13 14:24:53.688781 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:24:53.688787 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:24:53.688793 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:24:53.688799 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:24:53.688806 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:24:53.688812 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:24:53.688818 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:24:53.688824 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:24:53.688830 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:24:53.688835 kernel: NET: Registered PF_XDP protocol family Dec 13 14:24:53.688885 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 14:24:53.688936 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 14:24:53.688989 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 14:24:53.689038 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 14:24:53.689088 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 14:24:53.689138 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 14:24:53.689187 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 14:24:53.689236 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 14:24:53.689287 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 14:24:53.689336 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 14:24:53.689385 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 14:24:53.689435 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 14:24:53.689489 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 14:24:53.689539 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 14:24:53.689589 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 14:24:53.689635 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 14:24:53.689682 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 14:24:53.689729 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 14:24:53.689777 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 14:24:53.689827 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 14:24:53.689875 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 14:24:53.689922 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 14:24:53.689968 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 14:24:53.690015 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:24:53.690064 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:24:53.690113 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690162 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690211 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690257 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690306 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690353 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690399 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690445 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690511 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690563 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690612 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690659 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690706 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690754 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690801 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690848 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690895 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.690945 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.690992 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691039 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691086 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691133 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691180 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691227 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691275 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691323 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691371 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691418 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691608 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691661 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691708 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691755 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691801 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691850 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691896 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.691943 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.691988 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692035 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692081 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692127 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692174 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692222 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692268 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692314 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692360 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692406 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692452 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692511 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692559 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692605 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692653 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692728 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692812 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692861 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.692907 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.692954 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693000 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693046 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693092 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693139 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693189 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693234 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693280 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693327 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693373 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693420 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693471 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693519 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693566 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693615 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693660 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.693707 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.693753 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.694367 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.694430 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.694500 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.694554 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.694611 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.694661 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.694712 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.694758 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.694805 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.694851 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:24:53.694898 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:24:53.694945 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:24:53.694994 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 14:24:53.695041 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:24:53.695090 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:24:53.695136 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:24:53.695186 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 14:24:53.695234 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:24:53.695280 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:24:53.695328 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:24:53.695374 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:24:53.695422 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:24:53.695706 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:24:53.695770 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:24:53.695820 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:24:53.695869 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:24:53.695917 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:24:53.695964 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:24:53.696011 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:24:53.696056 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:24:53.696102 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:24:53.696148 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:24:53.696197 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:24:53.696243 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:24:53.696289 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:24:53.696336 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:24:53.696391 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:24:53.696455 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:24:53.696957 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:24:53.697010 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:24:53.697059 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:24:53.697106 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:24:53.697153 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:24:53.697199 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:24:53.697250 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 14:24:53.697297 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:24:53.697343 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:24:53.697389 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:24:53.697457 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:24:53.697837 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:24:53.697891 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:24:53.697947 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:24:53.697996 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:24:53.698045 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:24:53.698092 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:24:53.698138 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:24:53.698185 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:24:53.698234 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:24:53.698280 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:24:53.698327 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:24:53.698374 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:24:53.698420 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:24:53.698568 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:24:53.698628 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:24:53.698676 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:24:53.698723 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:24:53.699052 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:24:53.699109 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:24:53.699164 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:24:53.699213 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:24:53.699260 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:24:53.699307 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:24:53.699356 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:24:53.699403 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:24:53.699449 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:24:53.699655 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:24:53.699710 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:24:53.699758 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:24:53.700085 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:24:53.700141 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:24:53.700192 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:24:53.700239 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:24:53.700286 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:24:53.700333 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:24:53.700380 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:24:53.700575 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:24:53.700626 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:24:53.700675 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:24:53.701004 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:24:53.701081 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:24:53.701135 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:24:53.701184 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:24:53.701231 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:24:53.701300 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:24:53.701350 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:24:53.701401 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:24:53.701450 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:24:53.701540 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:24:53.701588 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:24:53.701636 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:24:53.701688 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:24:53.701735 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:24:53.701786 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:24:53.701841 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:24:53.701892 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:24:53.701938 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:24:53.701984 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:24:53.702171 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:24:53.702223 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:24:53.702272 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:24:53.702625 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:24:53.702681 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:24:53.702731 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:24:53.702782 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:24:53.702836 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:24:53.702883 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:24:53.702930 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:24:53.702998 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:24:53.703049 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:24:53.703099 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:24:53.703148 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:24:53.703196 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:24:53.703508 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:24:53.703568 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:24:53.703641 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:24:53.703905 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:24:53.703955 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:24:53.703999 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:24:53.704057 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:24:53.704960 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:24:53.705013 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:24:53.705060 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:24:53.705103 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:24:53.705450 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 14:24:53.705554 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 14:24:53.705601 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:24:53.705644 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:24:53.705983 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:24:53.706036 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:24:53.706080 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:24:53.706123 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:24:53.706165 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:24:53.706207 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:24:53.706249 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:24:53.706296 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 14:24:53.706339 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 14:24:53.706384 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:24:53.706431 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 14:24:53.706512 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 14:24:53.706558 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:24:53.706607 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 14:24:53.706650 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 14:24:53.706696 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:24:53.706743 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 14:24:53.706786 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:24:53.706835 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 14:24:53.706887 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:24:53.706937 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 14:24:53.706983 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:24:53.707034 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 14:24:53.707079 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:24:53.707125 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 14:24:53.707170 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:24:53.707217 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 14:24:53.707263 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 14:24:53.707306 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:24:53.707354 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 14:24:53.707398 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 14:24:53.707442 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:24:53.707508 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 14:24:53.707560 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 14:24:53.707607 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:24:53.707655 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 14:24:53.707699 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:24:53.707755 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 14:24:53.707800 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:24:53.707848 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 14:24:53.707895 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:24:53.707943 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 14:24:53.707987 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:24:53.708034 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 14:24:53.708078 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:24:53.708126 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 14:24:53.708170 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 14:24:53.708216 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:24:53.708264 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 14:24:53.708308 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 14:24:53.708351 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:24:53.708403 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 14:24:53.708450 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 14:24:53.708523 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:24:53.708574 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 14:24:53.708619 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:24:53.708667 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 14:24:53.708857 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:24:53.708909 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 14:24:53.708954 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:24:53.709187 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 14:24:53.709238 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:24:53.709286 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 14:24:53.709332 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:24:53.709407 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 14:24:53.709717 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 14:24:53.709944 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:24:53.709998 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 14:24:53.710045 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 14:24:53.710104 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:24:53.710402 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 14:24:53.710455 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:24:53.710640 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 14:24:53.710687 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:24:53.710736 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 14:24:53.710964 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:24:53.711016 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 14:24:53.711061 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:24:53.711137 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 14:24:53.711427 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:24:53.711673 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 14:24:53.711724 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:24:53.711778 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:24:53.711788 kernel: PCI: CLS 32 bytes, default 64 Dec 13 14:24:53.711795 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:24:53.711803 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:24:53.711810 kernel: clocksource: Switched to clocksource tsc Dec 13 14:24:53.711816 kernel: Initialise system trusted keyrings Dec 13 14:24:53.711822 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:24:53.711828 kernel: Key type asymmetric registered Dec 13 14:24:53.711834 kernel: Asymmetric key parser 'x509' registered Dec 13 14:24:53.711859 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:24:53.711867 kernel: io scheduler mq-deadline registered Dec 13 14:24:53.711873 kernel: io scheduler kyber registered Dec 13 14:24:53.711881 kernel: io scheduler bfq registered Dec 13 14:24:53.712175 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 14:24:53.712232 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.712374 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 14:24:53.712427 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.712529 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 14:24:53.712582 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.712633 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 14:24:53.712987 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713042 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 14:24:53.713092 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713142 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 14:24:53.713190 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713429 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 14:24:53.713492 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713543 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 14:24:53.713596 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713646 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 14:24:53.713696 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713745 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 14:24:53.713793 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713842 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 14:24:53.713890 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.713938 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 14:24:53.713986 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714037 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 14:24:53.714085 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714134 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 14:24:53.714182 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714231 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 14:24:53.714281 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714330 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 14:24:53.714378 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714427 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 14:24:53.714735 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714794 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 14:24:53.714845 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714898 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 14:24:53.714946 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.714995 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 14:24:53.715043 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715091 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 14:24:53.715138 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715190 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 14:24:53.715238 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715286 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 14:24:53.715333 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715382 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 14:24:53.715433 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715516 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 14:24:53.715566 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715614 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 14:24:53.715662 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715710 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 14:24:53.715760 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715810 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 14:24:53.715857 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.715906 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 14:24:53.715954 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.716002 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 14:24:53.716052 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.716100 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 14:24:53.716148 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.716197 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 14:24:53.716244 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:24:53.716255 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:24:53.716262 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:24:53.716268 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:24:53.716274 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 14:24:53.716281 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:24:53.716287 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:24:53.716337 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 14:24:53.716383 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T14:24:53 UTC (1734099893) Dec 13 14:24:53.716428 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 14:24:53.716437 kernel: fail to initialize ptp_kvm Dec 13 14:24:53.716444 kernel: intel_pstate: CPU model not supported Dec 13 14:24:53.716450 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:24:53.716456 kernel: Segment Routing with IPv6 Dec 13 14:24:53.717488 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:24:53.717503 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:24:53.717510 kernel: Key type dns_resolver registered Dec 13 14:24:53.717517 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:24:53.717525 kernel: IPI shorthand broadcast: enabled Dec 13 14:24:53.717531 kernel: sched_clock: Marking stable (833305597, 220066404)->(1120505443, -67133442) Dec 13 14:24:53.717538 kernel: registered taskstats version 1 Dec 13 14:24:53.717544 kernel: Loading compiled-in X.509 certificates Dec 13 14:24:53.717550 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:24:53.717556 kernel: Key type .fscrypt registered Dec 13 14:24:53.717562 kernel: Key type fscrypt-provisioning registered Dec 13 14:24:53.717568 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:24:53.717576 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:24:53.717582 kernel: ima: No architecture policies found Dec 13 14:24:53.717588 kernel: clk: Disabling unused clocks Dec 13 14:24:53.717594 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:24:53.717600 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:24:53.717606 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:24:53.717613 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:24:53.717619 kernel: Run /init as init process Dec 13 14:24:53.717625 kernel: with arguments: Dec 13 14:24:53.717632 kernel: /init Dec 13 14:24:53.717638 kernel: with environment: Dec 13 14:24:53.717644 kernel: HOME=/ Dec 13 14:24:53.717650 kernel: TERM=linux Dec 13 14:24:53.717660 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:24:53.717680 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:24:53.717690 systemd[1]: Detected virtualization vmware. Dec 13 14:24:53.717704 systemd[1]: Detected architecture x86-64. Dec 13 14:24:53.717713 systemd[1]: Running in initrd. Dec 13 14:24:53.717719 systemd[1]: No hostname configured, using default hostname. Dec 13 14:24:53.717726 systemd[1]: Hostname set to . Dec 13 14:24:53.717732 systemd[1]: Initializing machine ID from random generator. Dec 13 14:24:53.717741 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:24:53.717768 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:24:53.717783 systemd[1]: Reached target cryptsetup.target. Dec 13 14:24:53.717790 systemd[1]: Reached target paths.target. Dec 13 14:24:53.717798 systemd[1]: Reached target slices.target. Dec 13 14:24:53.717805 systemd[1]: Reached target swap.target. Dec 13 14:24:53.717811 systemd[1]: Reached target timers.target. Dec 13 14:24:53.717819 systemd[1]: Listening on iscsid.socket. Dec 13 14:24:53.717826 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:24:53.717832 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:24:53.717838 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:24:53.717845 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:24:53.717852 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:24:53.717858 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:24:53.717865 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:24:53.717871 systemd[1]: Reached target sockets.target. Dec 13 14:24:53.717877 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:24:53.717884 systemd[1]: Finished network-cleanup.service. Dec 13 14:24:53.717890 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:24:53.717897 systemd[1]: Starting systemd-journald.service... Dec 13 14:24:53.717903 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:24:53.717910 systemd[1]: Starting systemd-resolved.service... Dec 13 14:24:53.717916 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:24:53.717923 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:24:53.717929 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:24:53.717935 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:24:53.717941 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:24:53.717948 kernel: audit: type=1130 audit(1734099893.650:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.717955 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:24:53.717962 kernel: audit: type=1130 audit(1734099893.654:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.717968 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:24:53.717974 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:24:53.717981 kernel: audit: type=1130 audit(1734099893.666:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.717987 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:24:53.717993 systemd[1]: Started systemd-resolved.service. Dec 13 14:24:53.718000 systemd[1]: Reached target nss-lookup.target. Dec 13 14:24:53.718007 kernel: audit: type=1130 audit(1734099893.686:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.718014 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:24:53.718020 kernel: Bridge firewalling registered Dec 13 14:24:53.718031 systemd-journald[216]: Journal started Dec 13 14:24:53.718067 systemd-journald[216]: Runtime Journal (/run/log/journal/c697ad1c0d034567aadc10fa9c143473) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:24:53.718096 kernel: SCSI subsystem initialized Dec 13 14:24:53.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.642730 systemd-modules-load[217]: Inserted module 'overlay' Dec 13 14:24:53.682313 systemd-resolved[218]: Positive Trust Anchors: Dec 13 14:24:53.719556 systemd[1]: Started systemd-journald.service. Dec 13 14:24:53.682319 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:24:53.682338 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:24:53.684785 systemd-resolved[218]: Defaulting to hostname 'linux'. Dec 13 14:24:53.702035 systemd-modules-load[217]: Inserted module 'br_netfilter' Dec 13 14:24:53.720504 dracut-cmdline[233]: dracut-dracut-053 Dec 13 14:24:53.720504 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 14:24:53.720504 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:53.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.724487 kernel: audit: type=1130 audit(1734099893.719:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.731588 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:24:53.731618 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:24:53.732832 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:24:53.735205 systemd-modules-load[217]: Inserted module 'dm_multipath' Dec 13 14:24:53.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.735578 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:24:53.736069 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:24:53.739481 kernel: audit: type=1130 audit(1734099893.734:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.743770 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:24:53.746913 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:24:53.746927 kernel: audit: type=1130 audit(1734099893.743:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.758477 kernel: iscsi: registered transport (tcp) Dec 13 14:24:53.773667 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:24:53.773691 kernel: QLogic iSCSI HBA Driver Dec 13 14:24:53.789960 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:24:53.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.790689 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:24:53.793803 kernel: audit: type=1130 audit(1734099893.788:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.828486 kernel: raid6: avx2x4 gen() 48435 MB/s Dec 13 14:24:53.844479 kernel: raid6: avx2x4 xor() 21562 MB/s Dec 13 14:24:53.861477 kernel: raid6: avx2x2 gen() 52598 MB/s Dec 13 14:24:53.878480 kernel: raid6: avx2x2 xor() 32014 MB/s Dec 13 14:24:53.895481 kernel: raid6: avx2x1 gen() 45218 MB/s Dec 13 14:24:53.912487 kernel: raid6: avx2x1 xor() 27999 MB/s Dec 13 14:24:53.929485 kernel: raid6: sse2x4 gen() 21080 MB/s Dec 13 14:24:53.946484 kernel: raid6: sse2x4 xor() 11676 MB/s Dec 13 14:24:53.963480 kernel: raid6: sse2x2 gen() 21124 MB/s Dec 13 14:24:53.980480 kernel: raid6: sse2x2 xor() 13368 MB/s Dec 13 14:24:53.997481 kernel: raid6: sse2x1 gen() 18118 MB/s Dec 13 14:24:54.014744 kernel: raid6: sse2x1 xor() 8846 MB/s Dec 13 14:24:54.014775 kernel: raid6: using algorithm avx2x2 gen() 52598 MB/s Dec 13 14:24:54.014783 kernel: raid6: .... xor() 32014 MB/s, rmw enabled Dec 13 14:24:54.015938 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:24:54.024476 kernel: xor: automatically using best checksumming function avx Dec 13 14:24:54.084484 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:24:54.089155 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:24:54.089786 systemd[1]: Starting systemd-udevd.service... Dec 13 14:24:54.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:54.088000 audit: BPF prog-id=7 op=LOAD Dec 13 14:24:54.088000 audit: BPF prog-id=8 op=LOAD Dec 13 14:24:54.095483 kernel: audit: type=1130 audit(1734099894.087:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:54.100077 systemd-udevd[416]: Using default interface naming scheme 'v252'. Dec 13 14:24:54.102768 systemd[1]: Started systemd-udevd.service. Dec 13 14:24:54.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:54.103290 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:24:54.111577 dracut-pre-trigger[417]: rd.md=0: removing MD RAID activation Dec 13 14:24:54.127558 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:24:54.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:54.128097 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:24:54.190221 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:24:54.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:54.242483 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 14:24:54.245481 kernel: vmw_pvscsi: using 64bit dma Dec 13 14:24:54.248915 kernel: vmw_pvscsi: max_id: 16 Dec 13 14:24:54.248937 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 14:24:54.258477 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 14:24:54.262481 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 14:24:54.267864 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 14:24:54.267875 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 14:24:54.267882 kernel: vmw_pvscsi: using MSI-X Dec 13 14:24:54.267894 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 14:24:54.267914 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 14:24:54.275483 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 14:24:54.275894 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:24:54.277501 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 14:24:54.279484 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 14:24:54.281486 kernel: libata version 3.00 loaded. Dec 13 14:24:54.287496 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:24:54.291478 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 14:24:54.304846 kernel: AES CTR mode by8 optimization enabled Dec 13 14:24:54.304858 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 14:24:54.355338 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:24:54.355437 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 14:24:54.355534 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 14:24:54.355617 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 14:24:54.355694 kernel: scsi host1: ata_piix Dec 13 14:24:54.355779 kernel: scsi host2: ata_piix Dec 13 14:24:54.355859 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 14:24:54.355871 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 14:24:54.355880 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:54.355890 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:24:54.471482 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 14:24:54.478781 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 14:24:54.505500 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 14:24:54.523486 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:24:54.523499 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:24:54.867121 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:24:54.872480 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (462) Dec 13 14:24:54.880236 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:24:54.899844 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:24:54.903613 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:24:54.903791 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:24:54.904638 systemd[1]: Starting disk-uuid.service... Dec 13 14:24:55.348526 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:55.413493 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:56.372479 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:24:56.372521 disk-uuid[553]: The operation has completed successfully. Dec 13 14:24:56.405395 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:24:56.405448 systemd[1]: Finished disk-uuid.service. Dec 13 14:24:56.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.406035 systemd[1]: Starting verity-setup.service... Dec 13 14:24:56.418489 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:24:56.460857 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:24:56.461369 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:24:56.462010 systemd[1]: Finished verity-setup.service. Dec 13 14:24:56.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.516361 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:24:56.515012 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:24:56.515603 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 14:24:56.516096 systemd[1]: Starting ignition-setup.service... Dec 13 14:24:56.531481 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:56.531520 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:24:56.531532 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:24:56.537479 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:24:56.542596 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:24:56.548387 systemd[1]: Finished ignition-setup.service. Dec 13 14:24:56.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.548990 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:24:56.627130 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 14:24:56.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.627787 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:24:56.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.667000 audit: BPF prog-id=9 op=LOAD Dec 13 14:24:56.668690 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:24:56.669547 systemd[1]: Starting systemd-networkd.service... Dec 13 14:24:56.682945 systemd-networkd[734]: lo: Link UP Dec 13 14:24:56.682952 systemd-networkd[734]: lo: Gained carrier Dec 13 14:24:56.683217 systemd-networkd[734]: Enumeration completed Dec 13 14:24:56.683425 systemd-networkd[734]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 14:24:56.688010 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:24:56.688137 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:24:56.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.683711 systemd[1]: Started systemd-networkd.service. Dec 13 14:24:56.683853 systemd[1]: Reached target network.target. Dec 13 14:24:56.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.684364 systemd[1]: Starting iscsiuio.service... Dec 13 14:24:56.686068 systemd-networkd[734]: ens192: Link UP Dec 13 14:24:56.686071 systemd-networkd[734]: ens192: Gained carrier Dec 13 14:24:56.691438 systemd[1]: Started iscsiuio.service. Dec 13 14:24:56.693186 systemd[1]: Starting iscsid.service... Dec 13 14:24:56.696844 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:24:56.696844 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:24:56.696844 iscsid[739]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:24:56.696844 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:24:56.696844 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:24:56.696844 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:24:56.696844 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:24:56.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.697311 systemd[1]: Started iscsid.service. Dec 13 14:24:56.699000 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:24:56.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.705288 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:24:56.705434 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:24:56.705528 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:24:56.705631 systemd[1]: Reached target remote-fs.target. Dec 13 14:24:56.706578 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:24:56.711499 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:24:56.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.711978 ignition[605]: Ignition 2.14.0 Dec 13 14:24:56.711998 ignition[605]: Stage: fetch-offline Dec 13 14:24:56.712028 ignition[605]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:56.712042 ignition[605]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:24:56.714911 ignition[605]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:24:56.714984 ignition[605]: parsed url from cmdline: "" Dec 13 14:24:56.714986 ignition[605]: no config URL provided Dec 13 14:24:56.714989 ignition[605]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:24:56.714994 ignition[605]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:24:56.715341 ignition[605]: config successfully fetched Dec 13 14:24:56.715350 ignition[605]: parsing config with SHA512: 9a611e48b58e1130fc366ab345312021e27bb5b98cd82001273283c155c429d1856343e073d2e168354611fbb576a6048ed9da39f1fe869818de75cb0e5c04e0 Dec 13 14:24:56.721200 unknown[605]: fetched base config from "system" Dec 13 14:24:56.721208 unknown[605]: fetched user config from "vmware" Dec 13 14:24:56.721457 ignition[605]: fetch-offline: fetch-offline passed Dec 13 14:24:56.721510 ignition[605]: Ignition finished successfully Dec 13 14:24:56.722203 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:24:56.722364 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:24:56.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.722878 systemd[1]: Starting ignition-kargs.service... Dec 13 14:24:56.728201 ignition[753]: Ignition 2.14.0 Dec 13 14:24:56.728207 ignition[753]: Stage: kargs Dec 13 14:24:56.728267 ignition[753]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:56.728276 ignition[753]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:24:56.729574 ignition[753]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:24:56.730750 ignition[753]: kargs: kargs passed Dec 13 14:24:56.730780 ignition[753]: Ignition finished successfully Dec 13 14:24:56.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.731753 systemd[1]: Finished ignition-kargs.service. Dec 13 14:24:56.732318 systemd[1]: Starting ignition-disks.service... Dec 13 14:24:56.736795 ignition[759]: Ignition 2.14.0 Dec 13 14:24:56.736803 ignition[759]: Stage: disks Dec 13 14:24:56.736864 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:56.736873 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:24:56.738071 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:24:56.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.739912 systemd[1]: Finished ignition-disks.service. Dec 13 14:24:56.739419 ignition[759]: disks: disks passed Dec 13 14:24:56.740077 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:24:56.739454 ignition[759]: Ignition finished successfully Dec 13 14:24:56.740167 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:24:56.740249 systemd[1]: Reached target local-fs.target. Dec 13 14:24:56.740327 systemd[1]: Reached target sysinit.target. Dec 13 14:24:56.740402 systemd[1]: Reached target basic.target. Dec 13 14:24:56.740953 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:24:56.751772 systemd-fsck[767]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:24:56.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.753296 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:24:56.753852 systemd[1]: Mounting sysroot.mount... Dec 13 14:24:56.762501 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:24:56.762822 systemd[1]: Mounted sysroot.mount. Dec 13 14:24:56.762971 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:24:56.763950 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:24:56.764286 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:24:56.764306 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:24:56.764319 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:24:56.766399 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:24:56.766906 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:24:56.769812 initrd-setup-root[777]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:24:56.773265 initrd-setup-root[785]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:24:56.775042 initrd-setup-root[793]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:24:56.777137 initrd-setup-root[801]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:24:56.805991 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:24:56.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.806577 systemd[1]: Starting ignition-mount.service... Dec 13 14:24:56.807009 systemd[1]: Starting sysroot-boot.service... Dec 13 14:24:56.810648 bash[818]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:24:56.815690 ignition[819]: INFO : Ignition 2.14.0 Dec 13 14:24:56.815932 ignition[819]: INFO : Stage: mount Dec 13 14:24:56.816101 ignition[819]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:56.816265 ignition[819]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:24:56.817796 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:24:56.819316 ignition[819]: INFO : mount: mount passed Dec 13 14:24:56.819458 ignition[819]: INFO : Ignition finished successfully Dec 13 14:24:56.819995 systemd[1]: Finished ignition-mount.service. Dec 13 14:24:56.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.825164 systemd[1]: Finished sysroot-boot.service. Dec 13 14:24:56.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:57.477263 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:24:57.486138 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (828) Dec 13 14:24:57.487948 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:57.487963 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:24:57.487972 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:24:57.501485 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:24:57.503761 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:24:57.504488 systemd[1]: Starting ignition-files.service... Dec 13 14:24:57.516044 ignition[848]: INFO : Ignition 2.14.0 Dec 13 14:24:57.516419 ignition[848]: INFO : Stage: files Dec 13 14:24:57.516732 ignition[848]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:57.516985 ignition[848]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:24:57.519063 ignition[848]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:24:57.521603 ignition[848]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:24:57.522231 ignition[848]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:24:57.522443 ignition[848]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:24:57.524832 ignition[848]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:24:57.525117 ignition[848]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:24:57.526103 unknown[848]: wrote ssh authorized keys file for user: core Dec 13 14:24:57.526388 ignition[848]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:24:57.527321 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:24:57.527690 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:24:57.530501 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:24:57.530781 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:24:57.530989 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:24:57.531311 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:24:57.531801 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:24:57.532032 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:57.539363 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1046938461" Dec 13 14:24:57.539608 ignition[848]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1046938461": device or resource busy Dec 13 14:24:57.539812 ignition[848]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1046938461", trying btrfs: device or resource busy Dec 13 14:24:57.540023 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1046938461" Dec 13 14:24:57.541474 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (848) Dec 13 14:24:57.543172 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1046938461" Dec 13 14:24:57.543815 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1046938461" Dec 13 14:24:57.544619 systemd[1]: mnt-oem1046938461.mount: Deactivated successfully. Dec 13 14:24:57.545005 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1046938461" Dec 13 14:24:57.545201 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:24:57.545399 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:24:57.545661 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:24:58.496668 systemd-networkd[734]: ens192: Gained IPv6LL Dec 13 14:25:03.091704 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:25:03.394490 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:25:03.395003 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:25:03.395261 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:25:03.395454 ignition[848]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Dec 13 14:25:03.395600 ignition[848]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Dec 13 14:25:03.395768 ignition[848]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:25:03.396076 ignition[848]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:25:03.396310 ignition[848]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:25:03.396503 ignition[848]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:25:03.396658 ignition[848]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 14:25:03.396847 ignition[848]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 14:25:03.396992 ignition[848]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:25:03.397145 ignition[848]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:25:03.444787 ignition[848]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:25:03.445104 ignition[848]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:25:03.445424 ignition[848]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:25:03.445758 ignition[848]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:25:03.446003 ignition[848]: INFO : files: files passed Dec 13 14:25:03.446196 ignition[848]: INFO : Ignition finished successfully Dec 13 14:25:03.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.453537 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:25:03.453555 kernel: audit: type=1130 audit(1734099903.446:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.447925 systemd[1]: Finished ignition-files.service. Dec 13 14:25:03.448848 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:25:03.448997 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:25:03.451497 systemd[1]: Starting ignition-quench.service... Dec 13 14:25:03.456465 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:25:03.456556 systemd[1]: Finished ignition-quench.service. Dec 13 14:25:03.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.458241 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:25:03.465613 kernel: audit: type=1130 audit(1734099903.455:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.465630 kernel: audit: type=1131 audit(1734099903.455:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.465639 kernel: audit: type=1130 audit(1734099903.461:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.465690 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:25:03.462866 systemd[1]: Reached target ignition-complete.target. Dec 13 14:25:03.466058 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:25:03.474102 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:25:03.474147 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:25:03.474555 systemd[1]: Reached target initrd-fs.target. Dec 13 14:25:03.474756 systemd[1]: Reached target initrd.target. Dec 13 14:25:03.474973 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:25:03.475585 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:25:03.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.480478 kernel: audit: type=1130 audit(1734099903.473:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.480495 kernel: audit: type=1131 audit(1734099903.473:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.481527 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:25:03.481965 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:25:03.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.485484 kernel: audit: type=1130 audit(1734099903.480:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.487659 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:25:03.487809 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:25:03.487986 systemd[1]: Stopped target timers.target. Dec 13 14:25:03.488135 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:25:03.488189 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:25:03.488459 systemd[1]: Stopped target initrd.target. Dec 13 14:25:03.490948 kernel: audit: type=1131 audit(1734099903.486:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.490898 systemd[1]: Stopped target basic.target. Dec 13 14:25:03.491043 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:25:03.491231 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:25:03.491399 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:25:03.491648 systemd[1]: Stopped target remote-fs.target. Dec 13 14:25:03.491823 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:25:03.491999 systemd[1]: Stopped target sysinit.target. Dec 13 14:25:03.492163 systemd[1]: Stopped target local-fs.target. Dec 13 14:25:03.492330 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:25:03.492512 systemd[1]: Stopped target swap.target. Dec 13 14:25:03.492700 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:25:03.492756 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:25:03.493015 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:25:03.495546 kernel: audit: type=1131 audit(1734099903.491:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.495476 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:25:03.495550 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:25:03.495733 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:25:03.498553 kernel: audit: type=1131 audit(1734099903.494:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.495787 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:25:03.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.498586 systemd[1]: Stopped target paths.target. Dec 13 14:25:03.498721 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:25:03.500496 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:25:03.500703 systemd[1]: Stopped target slices.target. Dec 13 14:25:03.500884 systemd[1]: Stopped target sockets.target. Dec 13 14:25:03.501042 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:25:03.501082 systemd[1]: Closed iscsid.socket. Dec 13 14:25:03.501230 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:25:03.501289 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:25:03.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.501533 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:25:03.501616 systemd[1]: Stopped ignition-files.service. Dec 13 14:25:03.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.502135 systemd[1]: Stopping ignition-mount.service... Dec 13 14:25:03.502328 systemd[1]: Stopping iscsiuio.service... Dec 13 14:25:03.506496 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:25:03.506610 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:25:03.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.507229 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:25:03.507333 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:25:03.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.507412 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:25:03.507582 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:25:03.507662 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:25:03.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.511273 ignition[887]: INFO : Ignition 2.14.0 Dec 13 14:25:03.511273 ignition[887]: INFO : Stage: umount Dec 13 14:25:03.511273 ignition[887]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:03.511273 ignition[887]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:25:03.511273 ignition[887]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:25:03.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.511525 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:25:03.511585 systemd[1]: Stopped iscsiuio.service. Dec 13 14:25:03.512423 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:25:03.512475 systemd[1]: Closed iscsiuio.socket. Dec 13 14:25:03.514455 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:25:03.514512 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:25:03.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.516193 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:25:03.517125 ignition[887]: INFO : umount: umount passed Dec 13 14:25:03.517125 ignition[887]: INFO : Ignition finished successfully Dec 13 14:25:03.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.520600 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:25:03.520656 systemd[1]: Stopped ignition-mount.service. Dec 13 14:25:03.520812 systemd[1]: Stopped target network.target. Dec 13 14:25:03.520901 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:25:03.520925 systemd[1]: Stopped ignition-disks.service. Dec 13 14:25:03.521025 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:25:03.521044 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:25:03.521149 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:25:03.521168 systemd[1]: Stopped ignition-setup.service. Dec 13 14:25:03.521535 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:25:03.521664 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:25:03.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.525029 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:25:03.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.525077 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:25:03.525454 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:25:03.525490 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:25:03.525936 systemd[1]: Stopping network-cleanup.service... Dec 13 14:25:03.527000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:25:03.526050 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:25:03.526076 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:25:03.526210 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 14:25:03.526231 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 14:25:03.526344 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:25:03.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.526370 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:25:03.526531 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:25:03.526552 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:25:03.526930 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:25:03.527781 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:25:03.529000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:25:03.528011 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:25:03.528055 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:25:03.531346 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:25:03.531420 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:25:03.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.532362 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:25:03.532567 systemd[1]: Stopped network-cleanup.service. Dec 13 14:25:03.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.532882 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:25:03.533039 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:25:03.533259 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:25:03.533407 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:25:03.533632 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:25:03.533781 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:25:03.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.534038 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:25:03.534186 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:25:03.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.534447 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:25:03.534627 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:25:03.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.535287 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:25:03.535609 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:25:03.535779 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:25:03.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.537188 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:25:03.537369 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:25:03.537631 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:25:03.537781 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:25:03.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.539772 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:25:03.539967 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:25:03.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.540305 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:25:03.540865 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:25:03.548012 systemd[1]: Switching root. Dec 13 14:25:03.563249 systemd-journald[216]: Journal stopped Dec 13 14:25:06.177850 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Dec 13 14:25:06.177868 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:25:06.177876 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:25:06.177882 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:25:06.177888 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:25:06.177894 kernel: SELinux: policy capability open_perms=1 Dec 13 14:25:06.177901 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:25:06.177906 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:25:06.177912 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:25:06.177917 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:25:06.177923 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:25:06.177928 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:25:06.177935 systemd[1]: Successfully loaded SELinux policy in 144.650ms. Dec 13 14:25:06.177942 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.822ms. Dec 13 14:25:06.177950 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:25:06.177957 systemd[1]: Detected virtualization vmware. Dec 13 14:25:06.177965 systemd[1]: Detected architecture x86-64. Dec 13 14:25:06.177971 systemd[1]: Detected first boot. Dec 13 14:25:06.177977 systemd[1]: Initializing machine ID from random generator. Dec 13 14:25:06.177984 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:25:06.177990 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:25:06.177997 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:25:06.178006 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:25:06.178017 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:25:06.178028 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:25:06.178038 systemd[1]: Stopped iscsid.service. Dec 13 14:25:06.178048 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:25:06.178058 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:25:06.178064 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:25:06.178071 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:25:06.178077 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:25:06.178085 systemd[1]: Created slice system-getty.slice. Dec 13 14:25:06.178092 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:25:06.178098 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:25:06.178105 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:25:06.178111 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:25:06.178118 systemd[1]: Created slice user.slice. Dec 13 14:25:06.178124 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:25:06.178130 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:25:06.178138 systemd[1]: Set up automount boot.automount. Dec 13 14:25:06.178145 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:25:06.178153 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:25:06.178159 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:25:06.178166 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:25:06.178172 systemd[1]: Reached target integritysetup.target. Dec 13 14:25:06.178179 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:25:06.178185 systemd[1]: Reached target remote-fs.target. Dec 13 14:25:06.178192 systemd[1]: Reached target slices.target. Dec 13 14:25:06.178199 systemd[1]: Reached target swap.target. Dec 13 14:25:06.178206 systemd[1]: Reached target torcx.target. Dec 13 14:25:06.178213 systemd[1]: Reached target veritysetup.target. Dec 13 14:25:06.178219 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:25:06.178226 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:25:06.178233 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:25:06.178240 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:25:06.178247 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:25:06.178254 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:25:06.178261 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:25:06.178267 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:25:06.178274 systemd[1]: Mounting media.mount... Dec 13 14:25:06.178281 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:06.178289 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:25:06.178296 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:25:06.178304 systemd[1]: Mounting tmp.mount... Dec 13 14:25:06.178310 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:25:06.178317 systemd[1]: Starting ignition-delete-config.service... Dec 13 14:25:06.178324 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:25:06.178330 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:25:06.178337 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:25:06.178344 systemd[1]: Starting modprobe@drm.service... Dec 13 14:25:06.178351 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:25:06.178358 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:25:06.178365 systemd[1]: Starting modprobe@loop.service... Dec 13 14:25:06.178372 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:25:06.178379 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:25:06.178386 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:25:06.178393 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:25:06.178403 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:25:06.178414 systemd[1]: Stopped systemd-journald.service. Dec 13 14:25:06.178423 systemd[1]: Starting systemd-journald.service... Dec 13 14:25:06.178430 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:25:06.178437 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:25:06.178443 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:25:06.178450 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:25:06.178457 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:25:06.178463 systemd[1]: Stopped verity-setup.service. Dec 13 14:25:06.178479 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:06.178488 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:25:06.178496 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:25:06.178503 systemd[1]: Mounted media.mount. Dec 13 14:25:06.178516 kernel: fuse: init (API version 7.34) Dec 13 14:25:06.178524 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:25:06.178699 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:25:06.178713 systemd[1]: Mounted tmp.mount. Dec 13 14:25:06.178723 systemd-journald[1011]: Journal started Dec 13 14:25:06.178754 systemd-journald[1011]: Runtime Journal (/run/log/journal/d2b9ca857cd242aebceb74363705c40d) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:25:03.981000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:25:04.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:25:04.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:25:04.043000 audit: BPF prog-id=10 op=LOAD Dec 13 14:25:04.043000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:25:04.043000 audit: BPF prog-id=11 op=LOAD Dec 13 14:25:04.043000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:25:04.130000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:25:04.130000 audit[920]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.130000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:25:04.131000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:25:04.131000 audit[920]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.131000 audit: CWD cwd="/" Dec 13 14:25:04.131000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:04.131000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:04.131000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:25:06.047000 audit: BPF prog-id=12 op=LOAD Dec 13 14:25:06.047000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:25:06.047000 audit: BPF prog-id=13 op=LOAD Dec 13 14:25:06.047000 audit: BPF prog-id=14 op=LOAD Dec 13 14:25:06.047000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:25:06.047000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:25:06.048000 audit: BPF prog-id=15 op=LOAD Dec 13 14:25:06.048000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:25:06.048000 audit: BPF prog-id=16 op=LOAD Dec 13 14:25:06.048000 audit: BPF prog-id=17 op=LOAD Dec 13 14:25:06.048000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:25:06.048000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:25:06.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.052000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:25:06.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.153000 audit: BPF prog-id=18 op=LOAD Dec 13 14:25:06.153000 audit: BPF prog-id=19 op=LOAD Dec 13 14:25:06.153000 audit: BPF prog-id=20 op=LOAD Dec 13 14:25:06.153000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:25:06.153000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:25:06.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.174000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:25:06.174000 audit[1011]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffde00a6560 a2=4000 a3=7ffde00a65fc items=0 ppid=1 pid=1011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:06.174000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:25:04.129648 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:25:06.046581 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:25:04.130259 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:25:06.050201 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:25:04.130272 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:25:04.130293 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:25:04.130299 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:25:04.130322 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:25:04.130330 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:25:04.130495 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:25:06.180005 systemd[1]: Started systemd-journald.service. Dec 13 14:25:04.130520 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:25:06.180061 jq[986]: true Dec 13 14:25:04.130531 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:25:04.131088 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:25:04.131120 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:25:04.131141 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:25:04.131157 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:25:04.131174 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:25:06.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:04.131188 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:25:06.181718 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:25:05.857655 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:06.181924 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:25:05.857807 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:06.181995 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:25:05.857866 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:06.182203 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:25:05.857971 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:06.182265 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:25:05.858003 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:25:06.182459 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:25:06.189138 jq[1020]: true Dec 13 14:25:05.858044 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:25:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:25:06.183189 systemd[1]: Finished modprobe@drm.service. Dec 13 14:25:06.183451 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:25:06.183642 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:25:06.183848 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:25:06.184072 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:25:06.184335 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:25:06.187066 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:25:06.189620 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:25:06.189728 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:25:06.192832 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:25:06.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.209063 systemd-journald[1011]: Time spent on flushing to /var/log/journal/d2b9ca857cd242aebceb74363705c40d is 41.417ms for 1978 entries. Dec 13 14:25:06.209063 systemd-journald[1011]: System Journal (/var/log/journal/d2b9ca857cd242aebceb74363705c40d) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:25:06.278436 systemd-journald[1011]: Received client request to flush runtime journal. Dec 13 14:25:06.278513 kernel: loop: module loaded Dec 13 14:25:06.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.193997 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:25:06.194119 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:25:06.194738 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:25:06.195946 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:25:06.196265 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:25:06.196399 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:25:06.196724 systemd[1]: Reached target network-pre.target. Dec 13 14:25:06.199318 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:25:06.200135 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:25:06.208688 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:25:06.208836 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:25:06.223196 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:25:06.229731 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:25:06.229807 systemd[1]: Finished modprobe@loop.service. Dec 13 14:25:06.229986 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:25:06.235445 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:25:06.236384 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:25:06.279747 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:25:06.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.284653 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:25:06.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.325086 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:25:06.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.326024 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:25:06.330888 udevadm[1050]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:25:06.330921 ignition[1024]: Ignition 2.14.0 Dec 13 14:25:06.331118 ignition[1024]: deleting config from guestinfo properties Dec 13 14:25:06.333628 ignition[1024]: Successfully deleted config Dec 13 14:25:06.334132 systemd[1]: Finished ignition-delete-config.service. Dec 13 14:25:06.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.666154 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:25:06.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.665000 audit: BPF prog-id=21 op=LOAD Dec 13 14:25:06.665000 audit: BPF prog-id=22 op=LOAD Dec 13 14:25:06.665000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:25:06.665000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:25:06.667544 systemd[1]: Starting systemd-udevd.service... Dec 13 14:25:06.680095 systemd-udevd[1051]: Using default interface naming scheme 'v252'. Dec 13 14:25:06.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.698000 audit: BPF prog-id=23 op=LOAD Dec 13 14:25:06.698772 systemd[1]: Started systemd-udevd.service. Dec 13 14:25:06.700074 systemd[1]: Starting systemd-networkd.service... Dec 13 14:25:06.705000 audit: BPF prog-id=24 op=LOAD Dec 13 14:25:06.705000 audit: BPF prog-id=25 op=LOAD Dec 13 14:25:06.705000 audit: BPF prog-id=26 op=LOAD Dec 13 14:25:06.707207 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:25:06.724113 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:25:06.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.732336 systemd[1]: Started systemd-userdbd.service. Dec 13 14:25:06.778501 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:25:06.780274 systemd-networkd[1060]: lo: Link UP Dec 13 14:25:06.780279 systemd-networkd[1060]: lo: Gained carrier Dec 13 14:25:06.780555 systemd-networkd[1060]: Enumeration completed Dec 13 14:25:06.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.780609 systemd[1]: Started systemd-networkd.service. Dec 13 14:25:06.780615 systemd-networkd[1060]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 14:25:06.782499 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:25:06.782647 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:25:06.783524 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 14:25:06.784655 systemd-networkd[1060]: ens192: Link UP Dec 13 14:25:06.784734 systemd-networkd[1060]: ens192: Gained carrier Dec 13 14:25:06.794482 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:25:06.811000 audit[1056]: AVC avc: denied { confidentiality } for pid=1056 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:25:06.811000 audit[1056]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5622426dbed0 a1=337fc a2=7ff77c020bc5 a3=5 items=110 ppid=1051 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:06.811000 audit: CWD cwd="/" Dec 13 14:25:06.811000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=1 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=2 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=3 name=(null) inode=24716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=4 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=5 name=(null) inode=24717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=6 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=7 name=(null) inode=24718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=8 name=(null) inode=24718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=9 name=(null) inode=24719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=10 name=(null) inode=24718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=11 name=(null) inode=24720 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=12 name=(null) inode=24718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=13 name=(null) inode=24721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=14 name=(null) inode=24718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=15 name=(null) inode=24722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=16 name=(null) inode=24718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=17 name=(null) inode=24723 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=18 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=19 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=20 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=21 name=(null) inode=24725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=22 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=23 name=(null) inode=24726 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=24 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=25 name=(null) inode=24727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=26 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=27 name=(null) inode=24728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=28 name=(null) inode=24724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=29 name=(null) inode=24729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=30 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=31 name=(null) inode=24730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=32 name=(null) inode=24730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=33 name=(null) inode=24731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=34 name=(null) inode=24730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=35 name=(null) inode=24732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=36 name=(null) inode=24730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=37 name=(null) inode=24733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=38 name=(null) inode=24730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=39 name=(null) inode=24734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=40 name=(null) inode=24730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=41 name=(null) inode=24735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=42 name=(null) inode=24715 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=43 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=44 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=45 name=(null) inode=24737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=46 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=47 name=(null) inode=24738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=48 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=49 name=(null) inode=24739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=50 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=51 name=(null) inode=24740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=52 name=(null) inode=24736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=53 name=(null) inode=24741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=55 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=56 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=57 name=(null) inode=24743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=58 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=59 name=(null) inode=24744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=60 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=61 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=62 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=63 name=(null) inode=24746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=64 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=65 name=(null) inode=24747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=66 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=67 name=(null) inode=24748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=68 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=69 name=(null) inode=24749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=70 name=(null) inode=24745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=71 name=(null) inode=24750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=72 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=73 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=74 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=75 name=(null) inode=24752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=76 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=77 name=(null) inode=24753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=78 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=79 name=(null) inode=24754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=80 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=81 name=(null) inode=24755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=82 name=(null) inode=24751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=83 name=(null) inode=24756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=84 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=85 name=(null) inode=24757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=86 name=(null) inode=24757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=87 name=(null) inode=24758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=88 name=(null) inode=24757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=89 name=(null) inode=24759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=90 name=(null) inode=24757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=91 name=(null) inode=24760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=92 name=(null) inode=24757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=93 name=(null) inode=24761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=94 name=(null) inode=24757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=95 name=(null) inode=24762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=96 name=(null) inode=24742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=97 name=(null) inode=24763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=98 name=(null) inode=24763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=99 name=(null) inode=24764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=100 name=(null) inode=24763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=101 name=(null) inode=24765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=102 name=(null) inode=24763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=103 name=(null) inode=24766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=104 name=(null) inode=24763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=105 name=(null) inode=24767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=106 name=(null) inode=24763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=107 name=(null) inode=24768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PATH item=109 name=(null) inode=24769 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:06.811000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:25:06.821664 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 14:25:06.821778 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 14:25:06.822681 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 14:25:06.822762 kernel: Guest personality initialized and is active Dec 13 14:25:06.829494 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 14:25:06.829524 kernel: Initialized host personality Dec 13 14:25:06.841494 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:25:06.851500 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1067) Dec 13 14:25:06.871122 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:25:06.870984 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:25:06.872938 (udev-worker)[1064]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 14:25:06.911790 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:25:06.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.913003 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:25:06.962658 lvm[1084]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:25:06.989104 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:25:06.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.989347 systemd[1]: Reached target cryptsetup.target. Dec 13 14:25:06.990549 systemd[1]: Starting lvm2-activation.service... Dec 13 14:25:06.993724 lvm[1085]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:25:07.016266 systemd[1]: Finished lvm2-activation.service. Dec 13 14:25:07.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.016526 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:25:07.016668 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:25:07.016690 systemd[1]: Reached target local-fs.target. Dec 13 14:25:07.016816 systemd[1]: Reached target machines.target. Dec 13 14:25:07.018076 systemd[1]: Starting ldconfig.service... Dec 13 14:25:07.018712 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.018759 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:07.019862 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:25:07.020849 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:25:07.022161 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:25:07.024144 systemd[1]: Starting systemd-sysext.service... Dec 13 14:25:07.028070 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1087 (bootctl) Dec 13 14:25:07.028749 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:25:07.039947 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:25:07.057821 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:25:07.057962 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:25:07.066538 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:25:07.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.071701 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:25:07.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.074483 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:25:07.101481 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:25:07.119492 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:25:07.136328 (sd-sysext)[1100]: Using extensions 'kubernetes'. Dec 13 14:25:07.136910 (sd-sysext)[1100]: Merged extensions into '/usr'. Dec 13 14:25:07.141781 systemd-fsck[1097]: fsck.fat 4.2 (2021-01-31) Dec 13 14:25:07.141781 systemd-fsck[1097]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:25:07.142602 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:25:07.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.148161 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:25:07.148958 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:25:07.149645 systemd[1]: Starting modprobe@loop.service... Dec 13 14:25:07.149777 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.149851 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:07.151703 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:25:07.151779 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:25:07.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.152099 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:25:07.152169 systemd[1]: Finished modprobe@loop.service. Dec 13 14:25:07.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.152401 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:25:07.153576 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:25:07.153653 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:25:07.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.153896 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.171393 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:25:07.172770 systemd[1]: Mounting boot.mount... Dec 13 14:25:07.172916 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.174030 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:25:07.175524 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.178548 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:25:07.179318 systemd[1]: Finished systemd-sysext.service. Dec 13 14:25:07.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.180293 systemd[1]: Starting ensure-sysext.service... Dec 13 14:25:07.181155 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:25:07.184747 systemd[1]: Reloading. Dec 13 14:25:07.206616 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:25:07.218338 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:25:07.225535 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:25:07.228224 /usr/lib/systemd/system-generators/torcx-generator[1127]: time="2024-12-13T14:25:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:25:07.228240 /usr/lib/systemd/system-generators/torcx-generator[1127]: time="2024-12-13T14:25:07Z" level=info msg="torcx already run" Dec 13 14:25:07.292250 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:25:07.292260 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:25:07.305882 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:25:07.340000 audit: BPF prog-id=27 op=LOAD Dec 13 14:25:07.340000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:25:07.340000 audit: BPF prog-id=28 op=LOAD Dec 13 14:25:07.341000 audit: BPF prog-id=29 op=LOAD Dec 13 14:25:07.341000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:25:07.341000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:25:07.341000 audit: BPF prog-id=30 op=LOAD Dec 13 14:25:07.341000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:25:07.341000 audit: BPF prog-id=31 op=LOAD Dec 13 14:25:07.342000 audit: BPF prog-id=32 op=LOAD Dec 13 14:25:07.342000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:25:07.342000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:25:07.343000 audit: BPF prog-id=33 op=LOAD Dec 13 14:25:07.343000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:25:07.343000 audit: BPF prog-id=34 op=LOAD Dec 13 14:25:07.343000 audit: BPF prog-id=35 op=LOAD Dec 13 14:25:07.343000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:25:07.343000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:25:07.349185 systemd[1]: Mounted boot.mount. Dec 13 14:25:07.354034 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.354825 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:25:07.355856 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:25:07.357643 systemd[1]: Starting modprobe@loop.service... Dec 13 14:25:07.357885 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.357953 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:07.358020 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.358551 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:25:07.358630 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:25:07.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.358946 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:25:07.359015 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:25:07.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.359300 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:25:07.359374 systemd[1]: Finished modprobe@loop.service. Dec 13 14:25:07.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.359647 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:25:07.359708 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.360531 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.361230 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:25:07.361986 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:25:07.363523 systemd[1]: Starting modprobe@loop.service... Dec 13 14:25:07.364630 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.364704 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:07.364771 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.365255 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:25:07.365328 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:25:07.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.365657 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:25:07.365728 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:25:07.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.366007 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:25:07.366066 systemd[1]: Finished modprobe@loop.service. Dec 13 14:25:07.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.366316 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:25:07.366373 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.368152 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:25:07.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.368427 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.369117 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:25:07.370855 systemd[1]: Starting modprobe@drm.service... Dec 13 14:25:07.372464 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:25:07.373129 systemd[1]: Starting modprobe@loop.service... Dec 13 14:25:07.373422 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.373638 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:07.374482 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:25:07.374952 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:07.375591 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:25:07.375664 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:25:07.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.376824 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:25:07.376894 systemd[1]: Finished modprobe@drm.service. Dec 13 14:25:07.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.377177 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:25:07.377240 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:25:07.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.377525 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:25:07.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.377587 systemd[1]: Finished modprobe@loop.service. Dec 13 14:25:07.377947 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:25:07.378007 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.379438 systemd[1]: Finished ensure-sysext.service. Dec 13 14:25:07.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.417934 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:25:07.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.418950 systemd[1]: Starting audit-rules.service... Dec 13 14:25:07.419000 audit: BPF prog-id=36 op=LOAD Dec 13 14:25:07.420000 audit: BPF prog-id=37 op=LOAD Dec 13 14:25:07.419769 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:25:07.420563 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:25:07.421704 systemd[1]: Starting systemd-resolved.service... Dec 13 14:25:07.422785 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:25:07.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.423832 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:25:07.425978 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:25:07.426145 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:25:07.428000 audit[1205]: SYSTEM_BOOT pid=1205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.431904 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:25:07.454033 ldconfig[1086]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:25:07.458439 systemd[1]: Finished ldconfig.service. Dec 13 14:25:07.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.462476 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:25:07.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.466178 augenrules[1219]: No rules Dec 13 14:25:07.464000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:25:07.464000 audit[1219]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffccd811140 a2=420 a3=0 items=0 ppid=1199 pid=1219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:07.464000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:25:07.466723 systemd[1]: Starting systemd-update-done.service... Dec 13 14:25:07.467022 systemd[1]: Finished audit-rules.service. Dec 13 14:25:07.471218 systemd[1]: Finished systemd-update-done.service. Dec 13 14:25:07.475667 systemd-resolved[1202]: Positive Trust Anchors: Dec 13 14:25:07.475802 systemd-resolved[1202]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:25:07.475863 systemd-resolved[1202]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:25:07.484221 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:25:07.484355 systemd[1]: Reached target time-set.target. Dec 13 14:25:07.493535 systemd-resolved[1202]: Defaulting to hostname 'linux'. Dec 13 14:25:07.494487 systemd[1]: Started systemd-resolved.service. Dec 13 14:25:07.494611 systemd[1]: Reached target network.target. Dec 13 14:25:07.494699 systemd[1]: Reached target nss-lookup.target. Dec 13 14:25:07.494791 systemd[1]: Reached target sysinit.target. Dec 13 14:25:07.494922 systemd[1]: Started motdgen.path. Dec 13 14:25:07.495021 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:25:07.495196 systemd[1]: Started logrotate.timer. Dec 13 14:25:07.495321 systemd[1]: Started mdadm.timer. Dec 13 14:25:07.495438 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:25:07.495541 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:25:07.495559 systemd[1]: Reached target paths.target. Dec 13 14:25:07.495639 systemd[1]: Reached target timers.target. Dec 13 14:25:07.495881 systemd[1]: Listening on dbus.socket. Dec 13 14:25:07.496692 systemd[1]: Starting docker.socket... Dec 13 14:25:07.498375 systemd[1]: Listening on sshd.socket. Dec 13 14:25:07.498539 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:07.498770 systemd[1]: Listening on docker.socket. Dec 13 14:25:07.498892 systemd[1]: Reached target sockets.target. Dec 13 14:25:07.498976 systemd[1]: Reached target basic.target. Dec 13 14:25:07.499082 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.499098 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:25:07.499732 systemd[1]: Starting containerd.service... Dec 13 14:25:07.500448 systemd[1]: Starting dbus.service... Dec 13 14:25:07.501262 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:25:07.502151 systemd[1]: Starting extend-filesystems.service... Dec 13 14:25:07.503080 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:25:07.507650 jq[1230]: false Dec 13 14:25:07.503801 systemd[1]: Starting motdgen.service... Dec 13 14:25:07.504589 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:25:07.505662 systemd[1]: Starting sshd-keygen.service... Dec 13 14:25:07.507784 systemd[1]: Starting systemd-logind.service... Dec 13 14:25:07.508051 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:07.508096 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:25:07.508588 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:26:17.398964 jq[1241]: true Dec 13 14:26:17.383153 systemd-timesyncd[1203]: Contacted time server 51.81.209.232:123 (0.flatcar.pool.ntp.org). Dec 13 14:26:17.383181 systemd-timesyncd[1203]: Initial clock synchronization to Fri 2024-12-13 14:26:17.383099 UTC. Dec 13 14:26:17.383261 systemd[1]: Starting update-engine.service... Dec 13 14:26:17.385797 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:26:17.386778 systemd[1]: Starting vmtoolsd.service... Dec 13 14:26:17.387585 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:26:17.388194 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:26:17.389996 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:26:17.390115 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:26:17.392816 systemd[1]: Started vmtoolsd.service. Dec 13 14:26:17.395721 systemd-resolved[1202]: Clock change detected. Flushing caches. Dec 13 14:26:17.410708 jq[1246]: true Dec 13 14:26:17.416842 extend-filesystems[1231]: Found loop1 Dec 13 14:26:17.416842 extend-filesystems[1231]: Found sda Dec 13 14:26:17.417644 extend-filesystems[1231]: Found sda1 Dec 13 14:26:17.417644 extend-filesystems[1231]: Found sda2 Dec 13 14:26:17.417644 extend-filesystems[1231]: Found sda3 Dec 13 14:26:17.417644 extend-filesystems[1231]: Found usr Dec 13 14:26:17.417644 extend-filesystems[1231]: Found sda4 Dec 13 14:26:17.417644 extend-filesystems[1231]: Found sda6 Dec 13 14:26:17.417644 extend-filesystems[1231]: Found sda7 Dec 13 14:26:17.417644 extend-filesystems[1231]: Found sda9 Dec 13 14:26:17.417644 extend-filesystems[1231]: Checking size of /dev/sda9 Dec 13 14:26:17.434272 env[1245]: time="2024-12-13T14:26:17.434244849Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:26:17.437361 dbus-daemon[1229]: [system] SELinux support is enabled Dec 13 14:26:17.439708 systemd[1]: Started dbus.service. Dec 13 14:26:17.441214 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:26:17.441228 systemd[1]: Reached target system-config.target. Dec 13 14:26:17.441341 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:26:17.441351 systemd[1]: Reached target user-config.target. Dec 13 14:26:17.449597 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:26:17.449719 systemd[1]: Finished motdgen.service. Dec 13 14:26:17.455940 extend-filesystems[1231]: Old size kept for /dev/sda9 Dec 13 14:26:17.462765 extend-filesystems[1231]: Found sr0 Dec 13 14:26:17.456203 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:26:17.456288 systemd[1]: Finished extend-filesystems.service. Dec 13 14:26:17.477334 bash[1284]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:26:17.477968 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:26:17.479720 kernel: NET: Registered PF_VSOCK protocol family Dec 13 14:26:17.480747 systemd-logind[1237]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:26:17.480764 systemd-logind[1237]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:26:17.483842 systemd-logind[1237]: New seat seat0. Dec 13 14:26:17.484769 systemd[1]: Started systemd-logind.service. Dec 13 14:26:17.491451 update_engine[1239]: I1213 14:26:17.490837 1239 main.cc:92] Flatcar Update Engine starting Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.493757048Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.493841117Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494634015Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494648415Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494757436Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494767200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494774101Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494779578Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494829273Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497245 env[1245]: time="2024-12-13T14:26:17.494956310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:17.493938 systemd[1]: Started update-engine.service. Dec 13 14:26:17.497534 env[1245]: time="2024-12-13T14:26:17.495020962Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:17.497534 env[1245]: time="2024-12-13T14:26:17.495030153Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:26:17.497534 env[1245]: time="2024-12-13T14:26:17.495055861Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:26:17.497534 env[1245]: time="2024-12-13T14:26:17.495063712Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:26:17.495316 systemd[1]: Started locksmithd.service. Dec 13 14:26:17.498285 update_engine[1239]: I1213 14:26:17.498272 1239 update_check_scheduler.cc:74] Next update check in 11m30s Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501097617Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501118015Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501125891Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501150770Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501160715Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501168459Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501175023Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501182761Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501190741Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501197664Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501230819Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501244031Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501302859Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:26:17.503204 env[1245]: time="2024-12-13T14:26:17.501357121Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:26:17.502986 systemd[1]: Started containerd.service. Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501516743Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501533454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501541063Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501567941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501576027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501582985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501589440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501595591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501636807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501646251Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501653713Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501662380Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501731286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501740538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503523 env[1245]: time="2024-12-13T14:26:17.501747850Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503795 env[1245]: time="2024-12-13T14:26:17.501753786Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:26:17.503795 env[1245]: time="2024-12-13T14:26:17.501761750Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:26:17.503795 env[1245]: time="2024-12-13T14:26:17.501768123Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:26:17.503795 env[1245]: time="2024-12-13T14:26:17.501778813Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:26:17.503795 env[1245]: time="2024-12-13T14:26:17.501801850Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.501913770Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.501945758Z" level=info msg="Connect containerd service" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.501961584Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.502259181Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.502381014Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.502404177Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.502425563Z" level=info msg="containerd successfully booted in 0.068575s" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.503428743Z" level=info msg="Start subscribing containerd event" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.503460082Z" level=info msg="Start recovering state" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.503495978Z" level=info msg="Start event monitor" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.503510808Z" level=info msg="Start snapshots syncer" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.503519833Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:26:17.503875 env[1245]: time="2024-12-13T14:26:17.503526624Z" level=info msg="Start streaming server" Dec 13 14:26:17.641850 locksmithd[1287]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:26:17.842793 systemd-networkd[1060]: ens192: Gained IPv6LL Dec 13 14:26:17.843925 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:26:17.844207 systemd[1]: Reached target network-online.target. Dec 13 14:26:17.845444 systemd[1]: Starting kubelet.service... Dec 13 14:26:18.027979 sshd_keygen[1248]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:26:18.040482 systemd[1]: Finished sshd-keygen.service. Dec 13 14:26:18.041663 systemd[1]: Starting issuegen.service... Dec 13 14:26:18.044768 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:26:18.044850 systemd[1]: Finished issuegen.service. Dec 13 14:26:18.045821 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:26:18.057269 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:26:18.058346 systemd[1]: Started getty@tty1.service. Dec 13 14:26:18.059509 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:26:18.059752 systemd[1]: Reached target getty.target. Dec 13 14:26:18.702945 systemd[1]: Started kubelet.service. Dec 13 14:26:18.703369 systemd[1]: Reached target multi-user.target. Dec 13 14:26:18.704367 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:26:18.710056 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:26:18.710153 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:26:18.710331 systemd[1]: Startup finished in 867ms (kernel) + 10.211s (initrd) + 5.082s (userspace) = 16.161s. Dec 13 14:26:18.736500 login[1353]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 14:26:18.737149 login[1352]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:26:18.748392 systemd[1]: Created slice user-500.slice. Dec 13 14:26:18.749241 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:26:18.753682 systemd-logind[1237]: New session 1 of user core. Dec 13 14:26:18.756194 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:26:18.757196 systemd[1]: Starting user@500.service... Dec 13 14:26:18.760384 (systemd)[1359]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:18.810291 systemd[1359]: Queued start job for default target default.target. Dec 13 14:26:18.810626 systemd[1359]: Reached target paths.target. Dec 13 14:26:18.810638 systemd[1359]: Reached target sockets.target. Dec 13 14:26:18.810647 systemd[1359]: Reached target timers.target. Dec 13 14:26:18.810654 systemd[1359]: Reached target basic.target. Dec 13 14:26:18.810715 systemd[1]: Started user@500.service. Dec 13 14:26:18.811434 systemd[1]: Started session-1.scope. Dec 13 14:26:18.811885 systemd[1359]: Reached target default.target. Dec 13 14:26:18.812022 systemd[1359]: Startup finished in 48ms. Dec 13 14:26:19.498104 kubelet[1356]: E1213 14:26:19.498058 1356 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:26:19.499335 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:26:19.499417 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:26:19.738163 login[1353]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:26:19.741525 systemd-logind[1237]: New session 2 of user core. Dec 13 14:26:19.742101 systemd[1]: Started session-2.scope. Dec 13 14:26:29.621859 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:26:29.622014 systemd[1]: Stopped kubelet.service. Dec 13 14:26:29.623227 systemd[1]: Starting kubelet.service... Dec 13 14:26:29.864783 systemd[1]: Started kubelet.service. Dec 13 14:26:29.918676 kubelet[1388]: E1213 14:26:29.918619 1388 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:26:29.921027 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:26:29.921101 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:26:40.121945 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:26:40.122108 systemd[1]: Stopped kubelet.service. Dec 13 14:26:40.123492 systemd[1]: Starting kubelet.service... Dec 13 14:26:40.348325 systemd[1]: Started kubelet.service. Dec 13 14:26:40.402497 kubelet[1399]: E1213 14:26:40.402438 1399 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:26:40.403989 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:26:40.404075 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:26:50.621976 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:26:50.622124 systemd[1]: Stopped kubelet.service. Dec 13 14:26:50.623425 systemd[1]: Starting kubelet.service... Dec 13 14:26:50.904363 systemd[1]: Started kubelet.service. Dec 13 14:26:50.932795 kubelet[1410]: E1213 14:26:50.932769 1410 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:26:50.933992 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:26:50.934067 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:26:57.641445 systemd[1]: Created slice system-sshd.slice. Dec 13 14:26:57.642294 systemd[1]: Started sshd@0-139.178.70.99:22-147.75.109.163:50134.service. Dec 13 14:26:57.697556 sshd[1417]: Accepted publickey for core from 147.75.109.163 port 50134 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:26:57.698521 sshd[1417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:57.701799 systemd[1]: Started session-3.scope. Dec 13 14:26:57.702442 systemd-logind[1237]: New session 3 of user core. Dec 13 14:26:57.750037 systemd[1]: Started sshd@1-139.178.70.99:22-147.75.109.163:50138.service. Dec 13 14:26:57.783076 sshd[1422]: Accepted publickey for core from 147.75.109.163 port 50138 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:26:57.783959 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:57.787062 systemd[1]: Started session-4.scope. Dec 13 14:26:57.787652 systemd-logind[1237]: New session 4 of user core. Dec 13 14:26:57.837084 sshd[1422]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:57.838801 systemd[1]: Started sshd@2-139.178.70.99:22-147.75.109.163:50140.service. Dec 13 14:26:57.840165 systemd[1]: sshd@1-139.178.70.99:22-147.75.109.163:50138.service: Deactivated successfully. Dec 13 14:26:57.840520 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:26:57.840820 systemd-logind[1237]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:26:57.841234 systemd-logind[1237]: Removed session 4. Dec 13 14:26:57.867415 sshd[1427]: Accepted publickey for core from 147.75.109.163 port 50140 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:26:57.868327 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:57.871529 systemd[1]: Started session-5.scope. Dec 13 14:26:57.871761 systemd-logind[1237]: New session 5 of user core. Dec 13 14:26:57.919931 sshd[1427]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:57.921981 systemd[1]: sshd@2-139.178.70.99:22-147.75.109.163:50140.service: Deactivated successfully. Dec 13 14:26:57.922291 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:26:57.923110 systemd-logind[1237]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:26:57.923828 systemd[1]: Started sshd@3-139.178.70.99:22-147.75.109.163:50146.service. Dec 13 14:26:57.924436 systemd-logind[1237]: Removed session 5. Dec 13 14:26:57.951580 sshd[1434]: Accepted publickey for core from 147.75.109.163 port 50146 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:26:57.952339 sshd[1434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:57.955084 systemd-logind[1237]: New session 6 of user core. Dec 13 14:26:57.955529 systemd[1]: Started session-6.scope. Dec 13 14:26:58.007101 sshd[1434]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:58.009656 systemd[1]: Started sshd@4-139.178.70.99:22-147.75.109.163:50160.service. Dec 13 14:26:58.009970 systemd[1]: sshd@3-139.178.70.99:22-147.75.109.163:50146.service: Deactivated successfully. Dec 13 14:26:58.010406 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:26:58.010861 systemd-logind[1237]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:26:58.012111 systemd-logind[1237]: Removed session 6. Dec 13 14:26:58.043047 sshd[1439]: Accepted publickey for core from 147.75.109.163 port 50160 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:26:58.043931 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:58.047079 systemd-logind[1237]: New session 7 of user core. Dec 13 14:26:58.047423 systemd[1]: Started session-7.scope. Dec 13 14:26:58.107297 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:26:58.107462 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:58.114721 dbus-daemon[1229]: \xd0\u001d(\xc6\xfbU: received setenforce notice (enforcing=1260349456) Dec 13 14:26:58.115755 sudo[1443]: pam_unix(sudo:session): session closed for user root Dec 13 14:26:58.118247 sshd[1439]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:58.119905 systemd[1]: Started sshd@5-139.178.70.99:22-147.75.109.163:50166.service. Dec 13 14:26:58.121196 systemd[1]: sshd@4-139.178.70.99:22-147.75.109.163:50160.service: Deactivated successfully. Dec 13 14:26:58.121643 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:26:58.123705 systemd-logind[1237]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:26:58.124233 systemd-logind[1237]: Removed session 7. Dec 13 14:26:58.150532 sshd[1446]: Accepted publickey for core from 147.75.109.163 port 50166 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:26:58.151846 sshd[1446]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:58.155813 systemd[1]: Started session-8.scope. Dec 13 14:26:58.156374 systemd-logind[1237]: New session 8 of user core. Dec 13 14:26:58.206869 sudo[1451]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:26:58.207053 sudo[1451]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:58.209207 sudo[1451]: pam_unix(sudo:session): session closed for user root Dec 13 14:26:58.212375 sudo[1450]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:26:58.212541 sudo[1450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:58.219408 systemd[1]: Stopping audit-rules.service... Dec 13 14:26:58.219000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:26:58.221378 kernel: kauditd_printk_skb: 291 callbacks suppressed Dec 13 14:26:58.221416 kernel: audit: type=1305 audit(1734100018.219:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:26:58.219000 audit[1454]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe43eb6dd0 a2=420 a3=0 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.226956 kernel: audit: type=1300 audit(1734100018.219:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe43eb6dd0 a2=420 a3=0 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.219000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:26:58.228128 kernel: audit: type=1327 audit(1734100018.219:212): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:26:58.228157 auditctl[1454]: No rules Dec 13 14:26:58.231674 kernel: audit: type=1131 audit(1734100018.228:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.228467 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:26:58.228591 systemd[1]: Stopped audit-rules.service. Dec 13 14:26:58.229811 systemd[1]: Starting audit-rules.service... Dec 13 14:26:58.240842 augenrules[1471]: No rules Dec 13 14:26:58.248110 kernel: audit: type=1130 audit(1734100018.240:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.248167 kernel: audit: type=1106 audit(1734100018.241:215): pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.241000 audit[1450]: USER_END pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.241337 systemd[1]: Finished audit-rules.service. Dec 13 14:26:58.241921 sudo[1450]: pam_unix(sudo:session): session closed for user root Dec 13 14:26:58.247388 sshd[1446]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:58.241000 audit[1450]: CRED_DISP pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.249585 systemd[1]: sshd@5-139.178.70.99:22-147.75.109.163:50166.service: Deactivated successfully. Dec 13 14:26:58.249936 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:26:58.251625 kernel: audit: type=1104 audit(1734100018.241:216): pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.247000 audit[1446]: USER_END pid=1446 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.252878 systemd[1]: Started sshd@6-139.178.70.99:22-147.75.109.163:50180.service. Dec 13 14:26:58.253076 systemd-logind[1237]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:26:58.247000 audit[1446]: CRED_DISP pid=1446 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.256168 systemd-logind[1237]: Removed session 8. Dec 13 14:26:58.259172 kernel: audit: type=1106 audit(1734100018.247:217): pid=1446 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.259238 kernel: audit: type=1104 audit(1734100018.247:218): pid=1446 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.99:22-147.75.109.163:50166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.262273 kernel: audit: type=1131 audit(1734100018.248:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.99:22-147.75.109.163:50166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.99:22-147.75.109.163:50180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.283000 audit[1477]: USER_ACCT pid=1477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.283888 sshd[1477]: Accepted publickey for core from 147.75.109.163 port 50180 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:26:58.283000 audit[1477]: CRED_ACQ pid=1477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.283000 audit[1477]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd67341010 a2=3 a3=0 items=0 ppid=1 pid=1477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.283000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:58.284818 sshd[1477]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:58.288193 systemd[1]: Started session-9.scope. Dec 13 14:26:58.288518 systemd-logind[1237]: New session 9 of user core. Dec 13 14:26:58.291000 audit[1477]: USER_START pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.292000 audit[1479]: CRED_ACQ pid=1479 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:26:58.337000 audit[1480]: USER_ACCT pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.338000 audit[1480]: CRED_REFR pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.338644 sudo[1480]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:26:58.338786 sudo[1480]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:58.339000 audit[1480]: USER_START pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.345479 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Dec 13 14:26:58.347635 systemd[1]: Starting coreos-metadata.service... Dec 13 14:26:58.389942 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 14:26:58.390092 systemd[1]: Finished coreos-metadata.service. Dec 13 14:26:58.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:59.341018 systemd[1]: Stopped kubelet.service. Dec 13 14:26:59.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:59.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:59.342804 systemd[1]: Starting kubelet.service... Dec 13 14:26:59.356899 systemd[1]: Reloading. Dec 13 14:26:59.417185 /usr/lib/systemd/system-generators/torcx-generator[1548]: time="2024-12-13T14:26:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:26:59.417372 /usr/lib/systemd/system-generators/torcx-generator[1548]: time="2024-12-13T14:26:59Z" level=info msg="torcx already run" Dec 13 14:26:59.475842 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:26:59.475853 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:26:59.488185 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit: BPF prog-id=43 op=LOAD Dec 13 14:26:59.530000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit: BPF prog-id=44 op=LOAD Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit: BPF prog-id=45 op=LOAD Dec 13 14:26:59.530000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:26:59.530000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit: BPF prog-id=46 op=LOAD Dec 13 14:26:59.530000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.530000 audit: BPF prog-id=47 op=LOAD Dec 13 14:26:59.530000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit: BPF prog-id=48 op=LOAD Dec 13 14:26:59.531000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.531000 audit: BPF prog-id=49 op=LOAD Dec 13 14:26:59.531000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:26:59.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit: BPF prog-id=50 op=LOAD Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.532000 audit: BPF prog-id=51 op=LOAD Dec 13 14:26:59.532000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:26:59.532000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit: BPF prog-id=52 op=LOAD Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.533000 audit: BPF prog-id=53 op=LOAD Dec 13 14:26:59.533000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:26:59.533000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit: BPF prog-id=54 op=LOAD Dec 13 14:26:59.534000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit: BPF prog-id=55 op=LOAD Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit: BPF prog-id=56 op=LOAD Dec 13 14:26:59.534000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:26:59.534000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:59.534000 audit: BPF prog-id=57 op=LOAD Dec 13 14:26:59.534000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:26:59.554889 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:26:59.554937 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:26:59.555096 systemd[1]: Stopped kubelet.service. Dec 13 14:26:59.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:26:59.556487 systemd[1]: Starting kubelet.service... Dec 13 14:26:59.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:59.766706 systemd[1]: Started kubelet.service. Dec 13 14:26:59.816355 kubelet[1611]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:26:59.816586 kubelet[1611]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:26:59.816653 kubelet[1611]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:26:59.817035 kubelet[1611]: I1213 14:26:59.816941 1611 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:27:00.053571 kubelet[1611]: I1213 14:27:00.053486 1611 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:27:00.053571 kubelet[1611]: I1213 14:27:00.053507 1611 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:27:00.053898 kubelet[1611]: I1213 14:27:00.053881 1611 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:27:00.177515 kubelet[1611]: I1213 14:27:00.177493 1611 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:27:00.188434 kubelet[1611]: I1213 14:27:00.188401 1611 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:27:00.189797 kubelet[1611]: I1213 14:27:00.189778 1611 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:27:00.189929 kubelet[1611]: I1213 14:27:00.189912 1611 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:27:00.190622 kubelet[1611]: I1213 14:27:00.190598 1611 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:27:00.190622 kubelet[1611]: I1213 14:27:00.190622 1611 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:27:00.190713 kubelet[1611]: I1213 14:27:00.190700 1611 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:27:00.190778 kubelet[1611]: I1213 14:27:00.190767 1611 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:27:00.190778 kubelet[1611]: I1213 14:27:00.190779 1611 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:27:00.190844 kubelet[1611]: I1213 14:27:00.190797 1611 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:27:00.190844 kubelet[1611]: I1213 14:27:00.190804 1611 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:27:00.191221 kubelet[1611]: E1213 14:27:00.191208 1611 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:00.191357 kubelet[1611]: E1213 14:27:00.191346 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:00.192322 kubelet[1611]: I1213 14:27:00.192308 1611 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:27:00.195185 kubelet[1611]: I1213 14:27:00.195166 1611 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:27:00.196839 kubelet[1611]: W1213 14:27:00.196827 1611 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:27:00.197429 kubelet[1611]: I1213 14:27:00.197418 1611 server.go:1256] "Started kubelet" Dec 13 14:27:00.198000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:00.198000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:27:00.198000 audit[1611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007156e0 a1=c000b1c588 a2=c0007156b0 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.198000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:27:00.199284 kubelet[1611]: I1213 14:27:00.199257 1611 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:27:00.199000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:00.199000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:27:00.199000 audit[1611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009ea760 a1=c000b1c5a0 a2=c000715770 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.199000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:27:00.200023 kubelet[1611]: I1213 14:27:00.200013 1611 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:27:00.200117 kubelet[1611]: I1213 14:27:00.200110 1611 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:27:00.203714 kubelet[1611]: W1213 14:27:00.203676 1611 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.67.124.131" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:27:00.203825 kubelet[1611]: E1213 14:27:00.203817 1611 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.124.131" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:27:00.203900 kubelet[1611]: W1213 14:27:00.203891 1611 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:27:00.203945 kubelet[1611]: E1213 14:27:00.203938 1611 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:27:00.204294 kubelet[1611]: I1213 14:27:00.204275 1611 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:27:00.205833 kubelet[1611]: I1213 14:27:00.205818 1611 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:27:00.206023 kubelet[1611]: I1213 14:27:00.206015 1611 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:27:00.206627 kubelet[1611]: I1213 14:27:00.206611 1611 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:27:00.208146 kubelet[1611]: I1213 14:27:00.208133 1611 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:27:00.208282 kubelet[1611]: I1213 14:27:00.208273 1611 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:27:00.208369 kubelet[1611]: I1213 14:27:00.208361 1611 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:27:00.210410 kubelet[1611]: E1213 14:27:00.210398 1611 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:27:00.211239 kubelet[1611]: I1213 14:27:00.211225 1611 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:27:00.211309 kubelet[1611]: I1213 14:27:00.211290 1611 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:27:00.211949 kubelet[1611]: W1213 14:27:00.211936 1611 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:27:00.212029 kubelet[1611]: E1213 14:27:00.212020 1611 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:27:00.212776 kubelet[1611]: I1213 14:27:00.212764 1611 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:27:00.220865 kubelet[1611]: E1213 14:27:00.220848 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.131\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:27:00.225486 kubelet[1611]: E1213 14:27:00.225471 1611 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.131.1810c2c7dcdd0d96 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.131,UID:10.67.124.131,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.131,},FirstTimestamp:2024-12-13 14:27:00.197395862 +0000 UTC m=+0.428124347,LastTimestamp:2024-12-13 14:27:00.197395862 +0000 UTC m=+0.428124347,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.131,}" Dec 13 14:27:00.233339 kubelet[1611]: I1213 14:27:00.233320 1611 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:27:00.233339 kubelet[1611]: I1213 14:27:00.233333 1611 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:27:00.233339 kubelet[1611]: I1213 14:27:00.233344 1611 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:27:00.236438 kubelet[1611]: E1213 14:27:00.236422 1611 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.131.1810c2c7dda34e4c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.131,UID:10.67.124.131,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.131,},FirstTimestamp:2024-12-13 14:27:00.210388556 +0000 UTC m=+0.441117041,LastTimestamp:2024-12-13 14:27:00.210388556 +0000 UTC m=+0.441117041,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.131,}" Dec 13 14:27:00.239218 kubelet[1611]: I1213 14:27:00.239200 1611 policy_none.go:49] "None policy: Start" Dec 13 14:27:00.239685 kubelet[1611]: E1213 14:27:00.239672 1611 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.131.1810c2c7de4595fa default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.131,UID:10.67.124.131,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.131 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.131,},FirstTimestamp:2024-12-13 14:27:00.221023738 +0000 UTC m=+0.451752210,LastTimestamp:2024-12-13 14:27:00.221023738 +0000 UTC m=+0.451752210,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.131,}" Dec 13 14:27:00.239998 kubelet[1611]: I1213 14:27:00.239985 1611 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:27:00.240041 kubelet[1611]: I1213 14:27:00.240018 1611 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:27:00.243356 kubelet[1611]: E1213 14:27:00.243338 1611 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.131.1810c2c7de45a1a1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.131,UID:10.67.124.131,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.131 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.131,},FirstTimestamp:2024-12-13 14:27:00.221026721 +0000 UTC m=+0.451755194,LastTimestamp:2024-12-13 14:27:00.221026721 +0000 UTC m=+0.451755194,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.131,}" Dec 13 14:27:00.246068 kubelet[1611]: E1213 14:27:00.246053 1611 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.131.1810c2c7de45aa40 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.131,UID:10.67.124.131,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.131 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.131,},FirstTimestamp:2024-12-13 14:27:00.221028928 +0000 UTC m=+0.451757400,LastTimestamp:2024-12-13 14:27:00.221028928 +0000 UTC m=+0.451757400,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.131,}" Dec 13 14:27:00.251685 systemd[1]: Created slice kubepods.slice. Dec 13 14:27:00.255495 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:27:00.257436 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:27:00.264430 kubelet[1611]: I1213 14:27:00.264411 1611 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:27:00.264619 kubelet[1611]: I1213 14:27:00.264598 1611 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:27:00.264864 kubelet[1611]: I1213 14:27:00.264855 1611 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:27:00.263000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:00.263000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:27:00.263000 audit[1611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e55380 a1=c000e57ec0 a2=c000e55350 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.263000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:27:00.266000 audit[1624]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.266000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffecd336d50 a2=0 a3=7ffecd336d3c items=0 ppid=1611 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:27:00.268018 kubelet[1611]: E1213 14:27:00.268000 1611 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.131\" not found" Dec 13 14:27:00.267000 audit[1629]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.267000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffec79073e0 a2=0 a3=7ffec79073cc items=0 ppid=1611 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:27:00.273005 kubelet[1611]: E1213 14:27:00.272984 1611 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.131.1810c2c7e1115a78 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.131,UID:10.67.124.131,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.131,},FirstTimestamp:2024-12-13 14:27:00.26793228 +0000 UTC m=+0.498660757,LastTimestamp:2024-12-13 14:27:00.26793228 +0000 UTC m=+0.498660757,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.131,}" Dec 13 14:27:00.270000 audit[1632]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.270000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6319c520 a2=0 a3=7fff6319c50c items=0 ppid=1611 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:27:00.286000 audit[1637]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.286000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc4ef61b0 a2=0 a3=7fffc4ef619c items=0 ppid=1611 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:27:00.310117 kubelet[1611]: I1213 14:27:00.308861 1611 kubelet_node_status.go:73] "Attempting to register node" node="10.67.124.131" Dec 13 14:27:00.350000 audit[1642]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.350000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe79d6eaa0 a2=0 a3=7ffe79d6ea8c items=0 ppid=1611 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:27:00.350972 kubelet[1611]: I1213 14:27:00.350935 1611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:27:00.351000 audit[1643]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:00.351000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe5de660e0 a2=0 a3=7ffe5de660cc items=0 ppid=1611 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:27:00.352068 kubelet[1611]: I1213 14:27:00.352051 1611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:27:00.352090 kubelet[1611]: I1213 14:27:00.352069 1611 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:27:00.352090 kubelet[1611]: I1213 14:27:00.352084 1611 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:27:00.352160 kubelet[1611]: E1213 14:27:00.352149 1611 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:27:00.352000 audit[1644]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.352000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2f2ebae0 a2=0 a3=7ffc2f2ebacc items=0 ppid=1611 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:27:00.352000 audit[1645]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.352000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe9ce2e860 a2=0 a3=7ffe9ce2e84c items=0 ppid=1611 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:27:00.353000 audit[1646]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:00.353000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4f2b90e0 a2=0 a3=7ffc4f2b90cc items=0 ppid=1611 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:27:00.354000 audit[1647]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:00.354000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2a293830 a2=0 a3=7fff2a29381c items=0 ppid=1611 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:27:00.354000 audit[1648]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:00.354000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe8a842440 a2=0 a3=7ffe8a84242c items=0 ppid=1611 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:27:00.355000 audit[1649]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:00.355000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe5210f4a0 a2=0 a3=7ffe5210f48c items=0 ppid=1611 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:27:00.361104 kubelet[1611]: I1213 14:27:00.361080 1611 kubelet_node_status.go:76] "Successfully registered node" node="10.67.124.131" Dec 13 14:27:00.371789 kubelet[1611]: E1213 14:27:00.371762 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:00.472599 kubelet[1611]: E1213 14:27:00.472572 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:00.573711 kubelet[1611]: E1213 14:27:00.573080 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:00.673536 kubelet[1611]: E1213 14:27:00.673509 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:00.774260 kubelet[1611]: E1213 14:27:00.774227 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:00.874826 kubelet[1611]: E1213 14:27:00.874810 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:00.975677 kubelet[1611]: E1213 14:27:00.975649 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:01.055333 kubelet[1611]: I1213 14:27:01.055306 1611 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:27:01.055739 kubelet[1611]: W1213 14:27:01.055725 1611 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection force closed via ClientConn.Close") has prevented the request from succeeding Dec 13 14:27:01.076937 kubelet[1611]: E1213 14:27:01.076892 1611 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.67.124.131\" not found" Dec 13 14:27:01.178035 kubelet[1611]: I1213 14:27:01.177978 1611 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:27:01.178435 env[1245]: time="2024-12-13T14:27:01.178394387Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:27:01.178641 kubelet[1611]: I1213 14:27:01.178534 1611 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:27:01.191985 kubelet[1611]: E1213 14:27:01.191966 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:01.192060 kubelet[1611]: I1213 14:27:01.191979 1611 apiserver.go:52] "Watching apiserver" Dec 13 14:27:01.225406 kubelet[1611]: I1213 14:27:01.225388 1611 topology_manager.go:215] "Topology Admit Handler" podUID="d5900e46-8b68-4482-b87a-ec46ef77fd11" podNamespace="calico-system" podName="calico-node-vg789" Dec 13 14:27:01.225566 kubelet[1611]: I1213 14:27:01.225557 1611 topology_manager.go:215] "Topology Admit Handler" podUID="051561e4-dc35-426c-8f21-884ac342fe36" podNamespace="calico-system" podName="csi-node-driver-gncsq" Dec 13 14:27:01.225671 kubelet[1611]: I1213 14:27:01.225663 1611 topology_manager.go:215] "Topology Admit Handler" podUID="52116fbe-4b83-4c24-b473-b38da23dec89" podNamespace="kube-system" podName="kube-proxy-7ttxz" Dec 13 14:27:01.226044 kubelet[1611]: E1213 14:27:01.226025 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gncsq" podUID="051561e4-dc35-426c-8f21-884ac342fe36" Dec 13 14:27:01.228755 systemd[1]: Created slice kubepods-besteffort-podd5900e46_8b68_4482_b87a_ec46ef77fd11.slice. Dec 13 14:27:01.234966 systemd[1]: Created slice kubepods-besteffort-pod52116fbe_4b83_4c24_b473_b38da23dec89.slice. Dec 13 14:27:01.283017 sudo[1480]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:01.282000 audit[1480]: USER_END pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:01.282000 audit[1480]: CRED_DISP pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:01.283800 sshd[1477]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:01.284000 audit[1477]: USER_END pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:01.284000 audit[1477]: CRED_DISP pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:01.285574 systemd[1]: sshd@6-139.178.70.99:22-147.75.109.163:50180.service: Deactivated successfully. Dec 13 14:27:01.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.99:22-147.75.109.163:50180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:01.286038 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:27:01.286635 systemd-logind[1237]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:27:01.287061 systemd-logind[1237]: Removed session 9. Dec 13 14:27:01.309143 kubelet[1611]: I1213 14:27:01.309118 1611 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:27:01.313995 kubelet[1611]: I1213 14:27:01.313969 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-policysync\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314133 kubelet[1611]: I1213 14:27:01.314124 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d5900e46-8b68-4482-b87a-ec46ef77fd11-node-certs\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314199 kubelet[1611]: I1213 14:27:01.314191 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/52116fbe-4b83-4c24-b473-b38da23dec89-xtables-lock\") pod \"kube-proxy-7ttxz\" (UID: \"52116fbe-4b83-4c24-b473-b38da23dec89\") " pod="kube-system/kube-proxy-7ttxz" Dec 13 14:27:01.314258 kubelet[1611]: I1213 14:27:01.314250 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-lib-modules\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314315 kubelet[1611]: I1213 14:27:01.314307 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-xtables-lock\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314367 kubelet[1611]: I1213 14:27:01.314359 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/52116fbe-4b83-4c24-b473-b38da23dec89-lib-modules\") pod \"kube-proxy-7ttxz\" (UID: \"52116fbe-4b83-4c24-b473-b38da23dec89\") " pod="kube-system/kube-proxy-7ttxz" Dec 13 14:27:01.314429 kubelet[1611]: I1213 14:27:01.314422 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d5900e46-8b68-4482-b87a-ec46ef77fd11-tigera-ca-bundle\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314490 kubelet[1611]: I1213 14:27:01.314482 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-var-lib-calico\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314550 kubelet[1611]: I1213 14:27:01.314543 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-cni-log-dir\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314614 kubelet[1611]: I1213 14:27:01.314599 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/051561e4-dc35-426c-8f21-884ac342fe36-varrun\") pod \"csi-node-driver-gncsq\" (UID: \"051561e4-dc35-426c-8f21-884ac342fe36\") " pod="calico-system/csi-node-driver-gncsq" Dec 13 14:27:01.314670 kubelet[1611]: I1213 14:27:01.314663 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/051561e4-dc35-426c-8f21-884ac342fe36-registration-dir\") pod \"csi-node-driver-gncsq\" (UID: \"051561e4-dc35-426c-8f21-884ac342fe36\") " pod="calico-system/csi-node-driver-gncsq" Dec 13 14:27:01.314732 kubelet[1611]: I1213 14:27:01.314725 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-znrgz\" (UniqueName: \"kubernetes.io/projected/051561e4-dc35-426c-8f21-884ac342fe36-kube-api-access-znrgz\") pod \"csi-node-driver-gncsq\" (UID: \"051561e4-dc35-426c-8f21-884ac342fe36\") " pod="calico-system/csi-node-driver-gncsq" Dec 13 14:27:01.314804 kubelet[1611]: I1213 14:27:01.314789 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-flexvol-driver-host\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314840 kubelet[1611]: I1213 14:27:01.314817 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bb7f7\" (UniqueName: \"kubernetes.io/projected/d5900e46-8b68-4482-b87a-ec46ef77fd11-kube-api-access-bb7f7\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314864 kubelet[1611]: I1213 14:27:01.314850 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/051561e4-dc35-426c-8f21-884ac342fe36-socket-dir\") pod \"csi-node-driver-gncsq\" (UID: \"051561e4-dc35-426c-8f21-884ac342fe36\") " pod="calico-system/csi-node-driver-gncsq" Dec 13 14:27:01.314883 kubelet[1611]: I1213 14:27:01.314869 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-var-run-calico\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314883 kubelet[1611]: I1213 14:27:01.314881 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-cni-net-dir\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314920 kubelet[1611]: I1213 14:27:01.314899 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d5900e46-8b68-4482-b87a-ec46ef77fd11-cni-bin-dir\") pod \"calico-node-vg789\" (UID: \"d5900e46-8b68-4482-b87a-ec46ef77fd11\") " pod="calico-system/calico-node-vg789" Dec 13 14:27:01.314920 kubelet[1611]: I1213 14:27:01.314920 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/051561e4-dc35-426c-8f21-884ac342fe36-kubelet-dir\") pod \"csi-node-driver-gncsq\" (UID: \"051561e4-dc35-426c-8f21-884ac342fe36\") " pod="calico-system/csi-node-driver-gncsq" Dec 13 14:27:01.314957 kubelet[1611]: I1213 14:27:01.314934 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/52116fbe-4b83-4c24-b473-b38da23dec89-kube-proxy\") pod \"kube-proxy-7ttxz\" (UID: \"52116fbe-4b83-4c24-b473-b38da23dec89\") " pod="kube-system/kube-proxy-7ttxz" Dec 13 14:27:01.314957 kubelet[1611]: I1213 14:27:01.314949 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-st2sd\" (UniqueName: \"kubernetes.io/projected/52116fbe-4b83-4c24-b473-b38da23dec89-kube-api-access-st2sd\") pod \"kube-proxy-7ttxz\" (UID: \"52116fbe-4b83-4c24-b473-b38da23dec89\") " pod="kube-system/kube-proxy-7ttxz" Dec 13 14:27:01.417204 kubelet[1611]: E1213 14:27:01.417188 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.417300 kubelet[1611]: W1213 14:27:01.417291 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.417368 kubelet[1611]: E1213 14:27:01.417359 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.417486 kubelet[1611]: E1213 14:27:01.417480 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.417529 kubelet[1611]: W1213 14:27:01.417521 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.417575 kubelet[1611]: E1213 14:27:01.417568 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.417707 kubelet[1611]: E1213 14:27:01.417702 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.417753 kubelet[1611]: W1213 14:27:01.417745 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.417796 kubelet[1611]: E1213 14:27:01.417790 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.417923 kubelet[1611]: E1213 14:27:01.417917 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.417967 kubelet[1611]: W1213 14:27:01.417960 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.418015 kubelet[1611]: E1213 14:27:01.418009 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.418137 kubelet[1611]: E1213 14:27:01.418131 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.418178 kubelet[1611]: W1213 14:27:01.418170 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.418220 kubelet[1611]: E1213 14:27:01.418214 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.418325 kubelet[1611]: E1213 14:27:01.418320 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.418369 kubelet[1611]: W1213 14:27:01.418361 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.418411 kubelet[1611]: E1213 14:27:01.418405 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.418517 kubelet[1611]: E1213 14:27:01.418511 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.418556 kubelet[1611]: W1213 14:27:01.418549 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.418624 kubelet[1611]: E1213 14:27:01.418616 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.418756 kubelet[1611]: E1213 14:27:01.418750 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.418802 kubelet[1611]: W1213 14:27:01.418794 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.418846 kubelet[1611]: E1213 14:27:01.418840 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.419783 kubelet[1611]: E1213 14:27:01.419744 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.419783 kubelet[1611]: W1213 14:27:01.419752 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.419783 kubelet[1611]: E1213 14:27:01.419759 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.452727 kubelet[1611]: E1213 14:27:01.452051 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.452727 kubelet[1611]: W1213 14:27:01.452061 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.452727 kubelet[1611]: E1213 14:27:01.452074 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.452727 kubelet[1611]: E1213 14:27:01.452683 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.452727 kubelet[1611]: W1213 14:27:01.452689 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.452727 kubelet[1611]: E1213 14:27:01.452697 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.453583 kubelet[1611]: E1213 14:27:01.453573 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:01.453626 kubelet[1611]: W1213 14:27:01.453588 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:01.453626 kubelet[1611]: E1213 14:27:01.453598 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:01.534889 env[1245]: time="2024-12-13T14:27:01.534598402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vg789,Uid:d5900e46-8b68-4482-b87a-ec46ef77fd11,Namespace:calico-system,Attempt:0,}" Dec 13 14:27:01.539982 env[1245]: time="2024-12-13T14:27:01.539954674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7ttxz,Uid:52116fbe-4b83-4c24-b473-b38da23dec89,Namespace:kube-system,Attempt:0,}" Dec 13 14:27:02.192615 kubelet[1611]: E1213 14:27:02.192562 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:02.352942 env[1245]: time="2024-12-13T14:27:02.352900362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.354827 env[1245]: time="2024-12-13T14:27:02.354811852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.356437 env[1245]: time="2024-12-13T14:27:02.356421326Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.357579 env[1245]: time="2024-12-13T14:27:02.357566064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.358878 env[1245]: time="2024-12-13T14:27:02.358863290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.360060 env[1245]: time="2024-12-13T14:27:02.360044566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.361325 env[1245]: time="2024-12-13T14:27:02.361306185Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.363249 env[1245]: time="2024-12-13T14:27:02.363232706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:02.374213 env[1245]: time="2024-12-13T14:27:02.374127665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:02.374213 env[1245]: time="2024-12-13T14:27:02.374137138Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:02.374213 env[1245]: time="2024-12-13T14:27:02.374181075Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:02.374213 env[1245]: time="2024-12-13T14:27:02.374193075Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:02.374381 env[1245]: time="2024-12-13T14:27:02.374230592Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:02.374381 env[1245]: time="2024-12-13T14:27:02.374249721Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:02.374531 env[1245]: time="2024-12-13T14:27:02.374506415Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b2bea80f062ccb959a572b7e811911827fa5fe87879e425775ed7dd72510d1d5 pid=1683 runtime=io.containerd.runc.v2 Dec 13 14:27:02.376738 env[1245]: time="2024-12-13T14:27:02.376699201Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916 pid=1684 runtime=io.containerd.runc.v2 Dec 13 14:27:02.385892 systemd[1]: Started cri-containerd-b2bea80f062ccb959a572b7e811911827fa5fe87879e425775ed7dd72510d1d5.scope. Dec 13 14:27:02.396195 systemd[1]: Started cri-containerd-1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916.scope. Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.399000 audit: BPF prog-id=58 op=LOAD Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1683 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626561383066303632636362393539613537326237653831313931 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1683 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626561383066303632636362393539613537326237653831313931 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.400000 audit: BPF prog-id=59 op=LOAD Dec 13 14:27:02.400000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000213b50 items=0 ppid=1683 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626561383066303632636362393539613537326237653831313931 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit: BPF prog-id=60 op=LOAD Dec 13 14:27:02.401000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000213b98 items=0 ppid=1683 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626561383066303632636362393539613537326237653831313931 Dec 13 14:27:02.401000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:27:02.401000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.401000 audit: BPF prog-id=61 op=LOAD Dec 13 14:27:02.401000 audit[1702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000213fa8 items=0 ppid=1683 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626561383066303632636362393539613537326237653831313931 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.407000 audit: BPF prog-id=62 op=LOAD Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001d1c48 a2=10 a3=1c items=0 ppid=1684 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163333930316565663938326564613332343264336166353633353139 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001d16b0 a2=3c a3=c items=0 ppid=1684 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163333930316565663938326564613332343264336166353633353139 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit: BPF prog-id=63 op=LOAD Dec 13 14:27:02.408000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001d19d8 a2=78 a3=c00020d5a0 items=0 ppid=1684 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163333930316565663938326564613332343264336166353633353139 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit: BPF prog-id=64 op=LOAD Dec 13 14:27:02.408000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001d1770 a2=78 a3=c00020d5e8 items=0 ppid=1684 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163333930316565663938326564613332343264336166353633353139 Dec 13 14:27:02.408000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:27:02.408000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:02.408000 audit: BPF prog-id=65 op=LOAD Dec 13 14:27:02.408000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001d1c30 a2=78 a3=c00020d9f8 items=0 ppid=1684 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163333930316565663938326564613332343264336166353633353139 Dec 13 14:27:02.416248 env[1245]: time="2024-12-13T14:27:02.415683051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7ttxz,Uid:52116fbe-4b83-4c24-b473-b38da23dec89,Namespace:kube-system,Attempt:0,} returns sandbox id \"b2bea80f062ccb959a572b7e811911827fa5fe87879e425775ed7dd72510d1d5\"" Dec 13 14:27:02.423160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1586971851.mount: Deactivated successfully. Dec 13 14:27:02.423857 env[1245]: time="2024-12-13T14:27:02.423465334Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:27:02.424631 env[1245]: time="2024-12-13T14:27:02.424215229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vg789,Uid:d5900e46-8b68-4482-b87a-ec46ef77fd11,Namespace:calico-system,Attempt:0,} returns sandbox id \"1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916\"" Dec 13 14:27:02.551446 update_engine[1239]: I1213 14:27:02.549643 1239 update_attempter.cc:509] Updating boot flags... Dec 13 14:27:03.193225 kubelet[1611]: E1213 14:27:03.193190 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:03.352720 kubelet[1611]: E1213 14:27:03.352695 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gncsq" podUID="051561e4-dc35-426c-8f21-884ac342fe36" Dec 13 14:27:03.553920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3032069073.mount: Deactivated successfully. Dec 13 14:27:04.000127 env[1245]: time="2024-12-13T14:27:04.000086378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:04.001332 env[1245]: time="2024-12-13T14:27:04.001306244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:04.003227 env[1245]: time="2024-12-13T14:27:04.003201032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:04.004548 env[1245]: time="2024-12-13T14:27:04.004488832Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:27:04.005528 env[1245]: time="2024-12-13T14:27:04.005509797Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:27:04.005634 env[1245]: time="2024-12-13T14:27:04.005600152Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:04.006630 env[1245]: time="2024-12-13T14:27:04.006586624Z" level=info msg="CreateContainer within sandbox \"b2bea80f062ccb959a572b7e811911827fa5fe87879e425775ed7dd72510d1d5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:27:04.015120 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3530543222.mount: Deactivated successfully. Dec 13 14:27:04.019903 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1247712354.mount: Deactivated successfully. Dec 13 14:27:04.027477 env[1245]: time="2024-12-13T14:27:04.027436549Z" level=info msg="CreateContainer within sandbox \"b2bea80f062ccb959a572b7e811911827fa5fe87879e425775ed7dd72510d1d5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5ca9be1d1a13391195325771e322f0b27745d07a48c627014b2514593f974b6c\"" Dec 13 14:27:04.028189 env[1245]: time="2024-12-13T14:27:04.028161113Z" level=info msg="StartContainer for \"5ca9be1d1a13391195325771e322f0b27745d07a48c627014b2514593f974b6c\"" Dec 13 14:27:04.044076 systemd[1]: Started cri-containerd-5ca9be1d1a13391195325771e322f0b27745d07a48c627014b2514593f974b6c.scope. Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.070049 kernel: kauditd_printk_skb: 356 callbacks suppressed Dec 13 14:27:04.070172 kernel: audit: type=1400 audit(1734100024.065:463): avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f755c3b6ef8 items=0 ppid=1683 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563613962653164316131333339313139353332353737316533323266 Dec 13 14:27:04.082600 kernel: audit: type=1300 audit(1734100024.065:463): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f755c3b6ef8 items=0 ppid=1683 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.082723 kernel: audit: type=1327 audit(1734100024.065:463): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563613962653164316131333339313139353332353737316533323266 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.087648 kernel: audit: type=1400 audit(1734100024.065:464): avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.087743 kernel: audit: type=1400 audit(1734100024.065:464): avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.094019 kernel: audit: type=1400 audit(1734100024.065:464): avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.094076 kernel: audit: type=1400 audit(1734100024.065:464): avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.095396 env[1245]: time="2024-12-13T14:27:04.095374787Z" level=info msg="StartContainer for \"5ca9be1d1a13391195325771e322f0b27745d07a48c627014b2514593f974b6c\" returns successfully" Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.102640 kernel: audit: type=1400 audit(1734100024.065:464): avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.106637 kernel: audit: type=1400 audit(1734100024.065:464): avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.110630 kernel: audit: type=1400 audit(1734100024.065:464): avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit: BPF prog-id=66 op=LOAD Dec 13 14:27:04.065000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00030c208 items=0 ppid=1683 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563613962653164316131333339313139353332353737316533323266 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.065000 audit: BPF prog-id=67 op=LOAD Dec 13 14:27:04.065000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00030c258 items=0 ppid=1683 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563613962653164316131333339313139353332353737316533323266 Dec 13 14:27:04.072000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:27:04.072000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:04.072000 audit: BPF prog-id=68 op=LOAD Dec 13 14:27:04.072000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00030c2e8 items=0 ppid=1683 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563613962653164316131333339313139353332353737316533323266 Dec 13 14:27:04.149000 audit[1826]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.149000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd794f950 a2=0 a3=7fffd794f93c items=0 ppid=1785 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:27:04.149000 audit[1827]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.149000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5d4624a0 a2=0 a3=6cc6200823a071f2 items=0 ppid=1785 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:27:04.150000 audit[1828]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.150000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeb675b70 a2=0 a3=7ffeeb675b5c items=0 ppid=1785 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:27:04.150000 audit[1829]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.150000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6fb6d250 a2=0 a3=7ffd6fb6d23c items=0 ppid=1785 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:27:04.150000 audit[1830]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.150000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedd922ee0 a2=0 a3=7ffedd922ecc items=0 ppid=1785 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:27:04.153000 audit[1831]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.153000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2d525df0 a2=0 a3=7ffe2d525ddc items=0 ppid=1785 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:27:04.194261 kubelet[1611]: E1213 14:27:04.194199 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:04.252000 audit[1832]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.252000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc0eeb58c0 a2=0 a3=7ffc0eeb58ac items=0 ppid=1785 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:27:04.255000 audit[1834]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.255000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff8fb38c80 a2=0 a3=7fff8fb38c6c items=0 ppid=1785 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:27:04.258000 audit[1837]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.258000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc469fc4f0 a2=0 a3=7ffc469fc4dc items=0 ppid=1785 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:27:04.259000 audit[1838]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.259000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebbf50df0 a2=0 a3=7ffebbf50ddc items=0 ppid=1785 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:27:04.260000 audit[1840]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.260000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc04f3710 a2=0 a3=7fffc04f36fc items=0 ppid=1785 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:27:04.261000 audit[1841]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.261000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd76830a90 a2=0 a3=7ffd76830a7c items=0 ppid=1785 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:27:04.262000 audit[1843]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.262000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff99cf330 a2=0 a3=7ffff99cf31c items=0 ppid=1785 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:27:04.265000 audit[1846]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.265000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb1542930 a2=0 a3=7ffcb154291c items=0 ppid=1785 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:27:04.265000 audit[1847]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.265000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd904d2ef0 a2=0 a3=7ffd904d2edc items=0 ppid=1785 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:27:04.267000 audit[1849]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.267000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6f304590 a2=0 a3=7ffc6f30457c items=0 ppid=1785 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:27:04.267000 audit[1850]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.267000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe34c5d7e0 a2=0 a3=7ffe34c5d7cc items=0 ppid=1785 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:27:04.269000 audit[1852]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.269000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4841e4b0 a2=0 a3=7ffd4841e49c items=0 ppid=1785 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:27:04.271000 audit[1855]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.271000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe642c1a60 a2=0 a3=7ffe642c1a4c items=0 ppid=1785 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:27:04.273000 audit[1858]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.273000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd88658170 a2=0 a3=7ffd8865815c items=0 ppid=1785 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:27:04.274000 audit[1859]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.274000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2b0a35c0 a2=0 a3=7ffc2b0a35ac items=0 ppid=1785 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:27:04.275000 audit[1861]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.275000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd815951d0 a2=0 a3=7ffd815951bc items=0 ppid=1785 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:27:04.299000 audit[1865]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.299000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb53ea770 a2=0 a3=7ffdb53ea75c items=0 ppid=1785 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:27:04.300000 audit[1866]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.300000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc03d3700 a2=0 a3=7ffdc03d36ec items=0 ppid=1785 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:27:04.301000 audit[1868]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:04.301000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf09e66e0 a2=0 a3=7ffdf09e66cc items=0 ppid=1785 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:27:04.310000 audit[1874]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:04.310000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd8219b100 a2=0 a3=7ffd8219b0ec items=0 ppid=1785 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:04.330000 audit[1874]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:04.330000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffd8219b100 a2=0 a3=7ffd8219b0ec items=0 ppid=1785 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:04.345000 audit[1882]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.345000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb754c930 a2=0 a3=7fffb754c91c items=0 ppid=1785 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:27:04.347000 audit[1884]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.347000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6026ab60 a2=0 a3=7ffe6026ab4c items=0 ppid=1785 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:27:04.349000 audit[1887]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.349000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe56b4d460 a2=0 a3=7ffe56b4d44c items=0 ppid=1785 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:27:04.350000 audit[1888]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.350000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe83c41750 a2=0 a3=7ffe83c4173c items=0 ppid=1785 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:27:04.352000 audit[1890]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.352000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc79c7cb0 a2=0 a3=7ffcc79c7c9c items=0 ppid=1785 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:27:04.354000 audit[1891]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.354000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde85a1820 a2=0 a3=7ffde85a180c items=0 ppid=1785 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:27:04.356000 audit[1893]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.356000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb3c3b8e0 a2=0 a3=7ffeb3c3b8cc items=0 ppid=1785 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:27:04.359000 audit[1896]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.359000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff6417c530 a2=0 a3=7fff6417c51c items=0 ppid=1785 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:27:04.359000 audit[1897]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.359000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc170cf450 a2=0 a3=7ffc170cf43c items=0 ppid=1785 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:27:04.363000 audit[1899]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.363000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec5cd5c20 a2=0 a3=7ffec5cd5c0c items=0 ppid=1785 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:27:04.367000 audit[1900]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.367000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5110cd60 a2=0 a3=7fff5110cd4c items=0 ppid=1785 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:27:04.372000 audit[1902]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.372000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcb6aa290 a2=0 a3=7ffdcb6aa27c items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:27:04.375000 audit[1905]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.375000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecb58b650 a2=0 a3=7ffecb58b63c items=0 ppid=1785 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:27:04.377000 audit[1908]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.377000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcfab3aa40 a2=0 a3=7ffcfab3aa2c items=0 ppid=1785 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:27:04.377000 audit[1909]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.377000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe63651b10 a2=0 a3=7ffe63651afc items=0 ppid=1785 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:27:04.379000 audit[1911]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.379000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffad02dd00 a2=0 a3=7fffad02dcec items=0 ppid=1785 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:27:04.381000 audit[1914]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.381000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd4964efe0 a2=0 a3=7ffd4964efcc items=0 ppid=1785 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:27:04.382000 audit[1915]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.382000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6b5a7ee0 a2=0 a3=7ffd6b5a7ecc items=0 ppid=1785 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:27:04.383000 audit[1917]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.383000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcc4500820 a2=0 a3=7ffcc450080c items=0 ppid=1785 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:27:04.384000 audit[1918]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.384000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2d81e480 a2=0 a3=7ffc2d81e46c items=0 ppid=1785 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:27:04.385000 audit[1920]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.385000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc278ac980 a2=0 a3=7ffc278ac96c items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:27:04.387000 audit[1923]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:27:04.387000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffcbeac540 a2=0 a3=7fffcbeac52c items=0 ppid=1785 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:27:04.389000 audit[1925]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:27:04.389000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd72058f30 a2=0 a3=7ffd72058f1c items=0 ppid=1785 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.389000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:04.389000 audit[1925]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:27:04.389000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd72058f30 a2=0 a3=7ffd72058f1c items=0 ppid=1785 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:04.389000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:04.425812 kubelet[1611]: E1213 14:27:04.425725 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.425812 kubelet[1611]: W1213 14:27:04.425741 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.425812 kubelet[1611]: E1213 14:27:04.425756 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.426032 kubelet[1611]: E1213 14:27:04.425978 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.426032 kubelet[1611]: W1213 14:27:04.425984 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.426032 kubelet[1611]: E1213 14:27:04.425991 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.426267 kubelet[1611]: E1213 14:27:04.426118 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.426267 kubelet[1611]: W1213 14:27:04.426123 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.426267 kubelet[1611]: E1213 14:27:04.426129 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.426267 kubelet[1611]: E1213 14:27:04.426217 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.426267 kubelet[1611]: W1213 14:27:04.426221 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.426267 kubelet[1611]: E1213 14:27:04.426227 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.426458 kubelet[1611]: E1213 14:27:04.426412 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.426458 kubelet[1611]: W1213 14:27:04.426417 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.426458 kubelet[1611]: E1213 14:27:04.426423 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.426614 kubelet[1611]: E1213 14:27:04.426551 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.426614 kubelet[1611]: W1213 14:27:04.426556 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.426614 kubelet[1611]: E1213 14:27:04.426562 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.426757 kubelet[1611]: E1213 14:27:04.426709 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.426757 kubelet[1611]: W1213 14:27:04.426715 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.426757 kubelet[1611]: E1213 14:27:04.426720 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.426896 kubelet[1611]: E1213 14:27:04.426847 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.426896 kubelet[1611]: W1213 14:27:04.426852 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.426896 kubelet[1611]: E1213 14:27:04.426858 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.427036 kubelet[1611]: E1213 14:27:04.426984 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.427036 kubelet[1611]: W1213 14:27:04.426991 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.427036 kubelet[1611]: E1213 14:27:04.427000 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.427263 kubelet[1611]: E1213 14:27:04.427126 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.427263 kubelet[1611]: W1213 14:27:04.427131 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.427263 kubelet[1611]: E1213 14:27:04.427137 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.427263 kubelet[1611]: E1213 14:27:04.427217 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.427263 kubelet[1611]: W1213 14:27:04.427221 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.427263 kubelet[1611]: E1213 14:27:04.427227 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.427454 kubelet[1611]: E1213 14:27:04.427401 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.427454 kubelet[1611]: W1213 14:27:04.427407 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.427454 kubelet[1611]: E1213 14:27:04.427413 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.427585 kubelet[1611]: E1213 14:27:04.427538 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.427585 kubelet[1611]: W1213 14:27:04.427543 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.427585 kubelet[1611]: E1213 14:27:04.427549 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.427738 kubelet[1611]: E1213 14:27:04.427689 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.427738 kubelet[1611]: W1213 14:27:04.427695 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.427738 kubelet[1611]: E1213 14:27:04.427700 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.427872 kubelet[1611]: E1213 14:27:04.427826 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.427872 kubelet[1611]: W1213 14:27:04.427831 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.427872 kubelet[1611]: E1213 14:27:04.427837 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.428012 kubelet[1611]: E1213 14:27:04.427962 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.428012 kubelet[1611]: W1213 14:27:04.427967 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.428012 kubelet[1611]: E1213 14:27:04.427973 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.428146 kubelet[1611]: E1213 14:27:04.428099 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.428146 kubelet[1611]: W1213 14:27:04.428104 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.428146 kubelet[1611]: E1213 14:27:04.428110 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.428282 kubelet[1611]: E1213 14:27:04.428236 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.428282 kubelet[1611]: W1213 14:27:04.428241 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.428282 kubelet[1611]: E1213 14:27:04.428247 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.428416 kubelet[1611]: E1213 14:27:04.428369 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.428416 kubelet[1611]: W1213 14:27:04.428374 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.428416 kubelet[1611]: E1213 14:27:04.428380 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.428534 kubelet[1611]: E1213 14:27:04.428503 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.428534 kubelet[1611]: W1213 14:27:04.428508 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.428534 kubelet[1611]: E1213 14:27:04.428513 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.433352 kubelet[1611]: E1213 14:27:04.433182 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.433352 kubelet[1611]: W1213 14:27:04.433191 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.433352 kubelet[1611]: E1213 14:27:04.433202 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.433352 kubelet[1611]: E1213 14:27:04.433283 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.433352 kubelet[1611]: W1213 14:27:04.433287 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.433352 kubelet[1611]: E1213 14:27:04.433297 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.433611 kubelet[1611]: E1213 14:27:04.433572 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.433611 kubelet[1611]: W1213 14:27:04.433578 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.433611 kubelet[1611]: E1213 14:27:04.433589 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.433714 kubelet[1611]: E1213 14:27:04.433702 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.433714 kubelet[1611]: W1213 14:27:04.433713 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.433772 kubelet[1611]: E1213 14:27:04.433726 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.433827 kubelet[1611]: E1213 14:27:04.433817 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.433827 kubelet[1611]: W1213 14:27:04.433824 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.433894 kubelet[1611]: E1213 14:27:04.433833 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.433926 kubelet[1611]: E1213 14:27:04.433912 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.433958 kubelet[1611]: W1213 14:27:04.433929 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.433958 kubelet[1611]: E1213 14:27:04.433939 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.434042 kubelet[1611]: E1213 14:27:04.434031 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.434042 kubelet[1611]: W1213 14:27:04.434039 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.434115 kubelet[1611]: E1213 14:27:04.434045 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.434283 kubelet[1611]: E1213 14:27:04.434224 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.434283 kubelet[1611]: W1213 14:27:04.434230 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.434283 kubelet[1611]: E1213 14:27:04.434239 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.434482 kubelet[1611]: E1213 14:27:04.434416 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.434482 kubelet[1611]: W1213 14:27:04.434421 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.434482 kubelet[1611]: E1213 14:27:04.434431 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.434822 kubelet[1611]: E1213 14:27:04.434570 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.434822 kubelet[1611]: W1213 14:27:04.434577 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.434822 kubelet[1611]: E1213 14:27:04.434587 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.434822 kubelet[1611]: E1213 14:27:04.434691 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.434822 kubelet[1611]: W1213 14:27:04.434696 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.434822 kubelet[1611]: E1213 14:27:04.434703 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:04.436812 kubelet[1611]: E1213 14:27:04.434868 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:04.436812 kubelet[1611]: W1213 14:27:04.434872 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:04.436812 kubelet[1611]: E1213 14:27:04.434879 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.194865 kubelet[1611]: E1213 14:27:05.194830 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:05.352878 kubelet[1611]: E1213 14:27:05.352846 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gncsq" podUID="051561e4-dc35-426c-8f21-884ac342fe36" Dec 13 14:27:05.365761 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2877286858.mount: Deactivated successfully. Dec 13 14:27:05.436994 kubelet[1611]: E1213 14:27:05.435247 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.436994 kubelet[1611]: W1213 14:27:05.435266 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.436994 kubelet[1611]: E1213 14:27:05.435284 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.436994 kubelet[1611]: E1213 14:27:05.435388 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.436994 kubelet[1611]: W1213 14:27:05.435394 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.436994 kubelet[1611]: E1213 14:27:05.435403 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.436994 kubelet[1611]: E1213 14:27:05.435494 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.436994 kubelet[1611]: W1213 14:27:05.435499 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.436994 kubelet[1611]: E1213 14:27:05.435508 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.436994 kubelet[1611]: E1213 14:27:05.435615 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.437235 kubelet[1611]: W1213 14:27:05.435621 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.437235 kubelet[1611]: E1213 14:27:05.435629 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.437235 kubelet[1611]: E1213 14:27:05.435729 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.437235 kubelet[1611]: W1213 14:27:05.435735 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.437235 kubelet[1611]: E1213 14:27:05.435743 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.437235 kubelet[1611]: E1213 14:27:05.435831 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.437235 kubelet[1611]: W1213 14:27:05.435837 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.437235 kubelet[1611]: E1213 14:27:05.435845 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.437235 kubelet[1611]: E1213 14:27:05.435929 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.437235 kubelet[1611]: W1213 14:27:05.435935 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.437447 kubelet[1611]: E1213 14:27:05.435943 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.437447 kubelet[1611]: E1213 14:27:05.436068 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.437447 kubelet[1611]: W1213 14:27:05.436075 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.437447 kubelet[1611]: E1213 14:27:05.436084 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.437447 kubelet[1611]: E1213 14:27:05.436202 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.437447 kubelet[1611]: W1213 14:27:05.436209 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.437447 kubelet[1611]: E1213 14:27:05.436219 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.437447 kubelet[1611]: E1213 14:27:05.436346 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.437447 kubelet[1611]: W1213 14:27:05.436352 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.437447 kubelet[1611]: E1213 14:27:05.436362 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438026 kubelet[1611]: E1213 14:27:05.436511 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438026 kubelet[1611]: W1213 14:27:05.436517 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438026 kubelet[1611]: E1213 14:27:05.436525 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438026 kubelet[1611]: E1213 14:27:05.436611 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438026 kubelet[1611]: W1213 14:27:05.436616 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438026 kubelet[1611]: E1213 14:27:05.436622 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438026 kubelet[1611]: E1213 14:27:05.436701 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438026 kubelet[1611]: W1213 14:27:05.436706 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438026 kubelet[1611]: E1213 14:27:05.436711 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438026 kubelet[1611]: E1213 14:27:05.436780 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438219 kubelet[1611]: W1213 14:27:05.436785 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438219 kubelet[1611]: E1213 14:27:05.436792 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438219 kubelet[1611]: E1213 14:27:05.436860 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438219 kubelet[1611]: W1213 14:27:05.436864 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438219 kubelet[1611]: E1213 14:27:05.436869 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438219 kubelet[1611]: E1213 14:27:05.436945 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438219 kubelet[1611]: W1213 14:27:05.436949 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438219 kubelet[1611]: E1213 14:27:05.436955 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438219 kubelet[1611]: E1213 14:27:05.437687 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438219 kubelet[1611]: W1213 14:27:05.437695 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438416 kubelet[1611]: E1213 14:27:05.437703 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438416 kubelet[1611]: E1213 14:27:05.437782 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438416 kubelet[1611]: W1213 14:27:05.437786 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438416 kubelet[1611]: E1213 14:27:05.437792 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438416 kubelet[1611]: E1213 14:27:05.437865 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438416 kubelet[1611]: W1213 14:27:05.437870 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438416 kubelet[1611]: E1213 14:27:05.437876 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.438416 kubelet[1611]: E1213 14:27:05.437945 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.438416 kubelet[1611]: W1213 14:27:05.437949 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.438416 kubelet[1611]: E1213 14:27:05.437954 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.441201 kubelet[1611]: E1213 14:27:05.441179 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.441201 kubelet[1611]: W1213 14:27:05.441192 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.441201 kubelet[1611]: E1213 14:27:05.441205 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.441396 kubelet[1611]: E1213 14:27:05.441385 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.441396 kubelet[1611]: W1213 14:27:05.441392 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.441445 kubelet[1611]: E1213 14:27:05.441398 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.441551 kubelet[1611]: E1213 14:27:05.441541 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.441551 kubelet[1611]: W1213 14:27:05.441549 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.441630 kubelet[1611]: E1213 14:27:05.441558 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.441723 kubelet[1611]: E1213 14:27:05.441712 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.441723 kubelet[1611]: W1213 14:27:05.441719 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.441771 kubelet[1611]: E1213 14:27:05.441725 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.441860 kubelet[1611]: E1213 14:27:05.441851 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.441860 kubelet[1611]: W1213 14:27:05.441858 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.441915 kubelet[1611]: E1213 14:27:05.441870 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.442006 kubelet[1611]: E1213 14:27:05.441992 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.442006 kubelet[1611]: W1213 14:27:05.441999 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.442006 kubelet[1611]: E1213 14:27:05.442006 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.442758 kubelet[1611]: E1213 14:27:05.442156 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.442758 kubelet[1611]: W1213 14:27:05.442163 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.442758 kubelet[1611]: E1213 14:27:05.442173 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.442758 kubelet[1611]: E1213 14:27:05.442251 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.442758 kubelet[1611]: W1213 14:27:05.442255 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.442758 kubelet[1611]: E1213 14:27:05.442262 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.442758 kubelet[1611]: E1213 14:27:05.442337 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.442758 kubelet[1611]: W1213 14:27:05.442341 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.442758 kubelet[1611]: E1213 14:27:05.442350 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.442758 kubelet[1611]: E1213 14:27:05.442434 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.442960 kubelet[1611]: W1213 14:27:05.442438 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.442960 kubelet[1611]: E1213 14:27:05.442446 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.442960 kubelet[1611]: E1213 14:27:05.442597 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.442960 kubelet[1611]: W1213 14:27:05.442643 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.442960 kubelet[1611]: E1213 14:27:05.442654 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.442960 kubelet[1611]: E1213 14:27:05.442738 1611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:27:05.442960 kubelet[1611]: W1213 14:27:05.442742 1611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:27:05.442960 kubelet[1611]: E1213 14:27:05.442748 1611 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:27:05.459929 env[1245]: time="2024-12-13T14:27:05.459829778Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:05.462385 env[1245]: time="2024-12-13T14:27:05.462359328Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:05.463647 env[1245]: time="2024-12-13T14:27:05.463628052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:05.464524 env[1245]: time="2024-12-13T14:27:05.464506868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:05.464886 env[1245]: time="2024-12-13T14:27:05.464869879Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:27:05.466245 env[1245]: time="2024-12-13T14:27:05.466216338Z" level=info msg="CreateContainer within sandbox \"1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:27:05.473129 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2837303252.mount: Deactivated successfully. Dec 13 14:27:05.475121 env[1245]: time="2024-12-13T14:27:05.475097004Z" level=info msg="CreateContainer within sandbox \"1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e54ab0bff697693cac5c788c01b8165a08b7ddae8ed5a0c6dde62c662765edda\"" Dec 13 14:27:05.475653 env[1245]: time="2024-12-13T14:27:05.475594994Z" level=info msg="StartContainer for \"e54ab0bff697693cac5c788c01b8165a08b7ddae8ed5a0c6dde62c662765edda\"" Dec 13 14:27:05.486712 systemd[1]: Started cri-containerd-e54ab0bff697693cac5c788c01b8165a08b7ddae8ed5a0c6dde62c662765edda.scope. Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f4c0848a268 items=0 ppid=1684 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535346162306266663639373639336361633563373838633031623831 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit: BPF prog-id=69 op=LOAD Dec 13 14:27:05.498000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003c4098 items=0 ppid=1684 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535346162306266663639373639336361633563373838633031623831 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.498000 audit: BPF prog-id=70 op=LOAD Dec 13 14:27:05.498000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003c40e8 items=0 ppid=1684 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535346162306266663639373639336361633563373838633031623831 Dec 13 14:27:05.499000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:27:05.499000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:05.499000 audit: BPF prog-id=71 op=LOAD Dec 13 14:27:05.499000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003c4178 items=0 ppid=1684 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535346162306266663639373639336361633563373838633031623831 Dec 13 14:27:05.510503 env[1245]: time="2024-12-13T14:27:05.510453514Z" level=info msg="StartContainer for \"e54ab0bff697693cac5c788c01b8165a08b7ddae8ed5a0c6dde62c662765edda\" returns successfully" Dec 13 14:27:05.516023 systemd[1]: cri-containerd-e54ab0bff697693cac5c788c01b8165a08b7ddae8ed5a0c6dde62c662765edda.scope: Deactivated successfully. Dec 13 14:27:05.519000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:27:06.012930 env[1245]: time="2024-12-13T14:27:06.012892228Z" level=info msg="shim disconnected" id=e54ab0bff697693cac5c788c01b8165a08b7ddae8ed5a0c6dde62c662765edda Dec 13 14:27:06.013082 env[1245]: time="2024-12-13T14:27:06.013070407Z" level=warning msg="cleaning up after shim disconnected" id=e54ab0bff697693cac5c788c01b8165a08b7ddae8ed5a0c6dde62c662765edda namespace=k8s.io Dec 13 14:27:06.013136 env[1245]: time="2024-12-13T14:27:06.013121136Z" level=info msg="cleaning up dead shim" Dec 13 14:27:06.017660 env[1245]: time="2024-12-13T14:27:06.017637993Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:27:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2037 runtime=io.containerd.runc.v2\n" Dec 13 14:27:06.195681 kubelet[1611]: E1213 14:27:06.195653 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:06.366930 env[1245]: time="2024-12-13T14:27:06.366849753Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:27:06.376065 kubelet[1611]: I1213 14:27:06.376030 1611 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7ttxz" podStartSLOduration=4.788325633 podStartE2EDuration="6.375968218s" podCreationTimestamp="2024-12-13 14:27:00 +0000 UTC" firstStartedPulling="2024-12-13 14:27:02.41732069 +0000 UTC m=+2.648049163" lastFinishedPulling="2024-12-13 14:27:04.004963273 +0000 UTC m=+4.235691748" observedRunningTime="2024-12-13 14:27:04.372639181 +0000 UTC m=+4.603367662" watchObservedRunningTime="2024-12-13 14:27:06.375968218 +0000 UTC m=+6.606696696" Dec 13 14:27:07.196776 kubelet[1611]: E1213 14:27:07.196730 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:07.352508 kubelet[1611]: E1213 14:27:07.352457 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gncsq" podUID="051561e4-dc35-426c-8f21-884ac342fe36" Dec 13 14:27:08.197411 kubelet[1611]: E1213 14:27:08.197386 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:09.198131 kubelet[1611]: E1213 14:27:09.198094 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:09.352669 kubelet[1611]: E1213 14:27:09.352445 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gncsq" podUID="051561e4-dc35-426c-8f21-884ac342fe36" Dec 13 14:27:09.919559 env[1245]: time="2024-12-13T14:27:09.919493821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:09.920232 env[1245]: time="2024-12-13T14:27:09.920214532Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:09.920949 env[1245]: time="2024-12-13T14:27:09.920928388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:09.921796 env[1245]: time="2024-12-13T14:27:09.921779625Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:09.922138 env[1245]: time="2024-12-13T14:27:09.922123319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:27:09.923827 env[1245]: time="2024-12-13T14:27:09.923793012Z" level=info msg="CreateContainer within sandbox \"1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:27:09.931287 env[1245]: time="2024-12-13T14:27:09.931250175Z" level=info msg="CreateContainer within sandbox \"1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66\"" Dec 13 14:27:09.931693 env[1245]: time="2024-12-13T14:27:09.931673703Z" level=info msg="StartContainer for \"920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66\"" Dec 13 14:27:09.948276 systemd[1]: Started cri-containerd-920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66.scope. Dec 13 14:27:09.967288 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:27:09.967374 kernel: audit: type=1400 audit(1734100029.959:527): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.967398 kernel: audit: type=1300 audit(1734100029.959:527): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f789aeb9bd8 items=0 ppid=1684 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f789aeb9bd8 items=0 ppid=1684 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:09.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306535643030376230373634303432393730666434623539626631 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.975067 kernel: audit: type=1327 audit(1734100029.959:527): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306535643030376230373634303432393730666434623539626631 Dec 13 14:27:09.975110 kernel: audit: type=1400 audit(1734100029.959:528): avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.975131 kernel: audit: type=1400 audit(1734100029.959:528): avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.979948 kernel: audit: type=1400 audit(1734100029.959:528): avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.991776 kernel: audit: type=1400 audit(1734100029.959:528): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.991848 kernel: audit: type=1400 audit(1734100029.959:528): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.991868 kernel: audit: type=1400 audit(1734100029.959:528): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.991886 kernel: audit: type=1400 audit(1734100029.959:528): avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.959000 audit: BPF prog-id=72 op=LOAD Dec 13 14:27:09.959000 audit[2062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0938 items=0 ppid=1684 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:09.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306535643030376230373634303432393730666434623539626631 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit: BPF prog-id=73 op=LOAD Dec 13 14:27:09.966000 audit[2062]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0988 items=0 ppid=1684 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:09.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306535643030376230373634303432393730666434623539626631 Dec 13 14:27:09.966000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:27:09.966000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:09.966000 audit: BPF prog-id=74 op=LOAD Dec 13 14:27:09.966000 audit[2062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0a18 items=0 ppid=1684 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:09.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932306535643030376230373634303432393730666434623539626631 Dec 13 14:27:09.999771 env[1245]: time="2024-12-13T14:27:09.999746453Z" level=info msg="StartContainer for \"920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66\" returns successfully" Dec 13 14:27:10.198722 kubelet[1611]: E1213 14:27:10.198642 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:10.837133 env[1245]: time="2024-12-13T14:27:10.837085468Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:27:10.838466 systemd[1]: cri-containerd-920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66.scope: Deactivated successfully. Dec 13 14:27:10.841000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:27:10.849838 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66-rootfs.mount: Deactivated successfully. Dec 13 14:27:10.909968 kubelet[1611]: I1213 14:27:10.909895 1611 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:27:11.075713 env[1245]: time="2024-12-13T14:27:11.075678957Z" level=info msg="shim disconnected" id=920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66 Dec 13 14:27:11.075957 env[1245]: time="2024-12-13T14:27:11.075945776Z" level=warning msg="cleaning up after shim disconnected" id=920e5d007b0764042970fd4b59bf18784a764c6b838c5a9aae5efd857963ec66 namespace=k8s.io Dec 13 14:27:11.076008 env[1245]: time="2024-12-13T14:27:11.075993673Z" level=info msg="cleaning up dead shim" Dec 13 14:27:11.080974 env[1245]: time="2024-12-13T14:27:11.080948006Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:27:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2103 runtime=io.containerd.runc.v2\n" Dec 13 14:27:11.199252 kubelet[1611]: E1213 14:27:11.199224 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:11.355680 systemd[1]: Created slice kubepods-besteffort-pod051561e4_dc35_426c_8f21_884ac342fe36.slice. Dec 13 14:27:11.356976 env[1245]: time="2024-12-13T14:27:11.356955598Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gncsq,Uid:051561e4-dc35-426c-8f21-884ac342fe36,Namespace:calico-system,Attempt:0,}" Dec 13 14:27:11.373278 env[1245]: time="2024-12-13T14:27:11.373257284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:27:11.446921 env[1245]: time="2024-12-13T14:27:11.446876708Z" level=error msg="Failed to destroy network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:11.447938 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969-shm.mount: Deactivated successfully. Dec 13 14:27:11.448624 env[1245]: time="2024-12-13T14:27:11.448595980Z" level=error msg="encountered an error cleaning up failed sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:11.448699 env[1245]: time="2024-12-13T14:27:11.448682590Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gncsq,Uid:051561e4-dc35-426c-8f21-884ac342fe36,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:11.448915 kubelet[1611]: E1213 14:27:11.448897 1611 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:11.448958 kubelet[1611]: E1213 14:27:11.448937 1611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gncsq" Dec 13 14:27:11.448989 kubelet[1611]: E1213 14:27:11.448952 1611 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gncsq" Dec 13 14:27:11.449012 kubelet[1611]: E1213 14:27:11.449001 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gncsq_calico-system(051561e4-dc35-426c-8f21-884ac342fe36)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gncsq_calico-system(051561e4-dc35-426c-8f21-884ac342fe36)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gncsq" podUID="051561e4-dc35-426c-8f21-884ac342fe36" Dec 13 14:27:12.199674 kubelet[1611]: E1213 14:27:12.199640 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:12.375205 kubelet[1611]: I1213 14:27:12.374796 1611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Dec 13 14:27:12.375324 env[1245]: time="2024-12-13T14:27:12.375298762Z" level=info msg="StopPodSandbox for \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\"" Dec 13 14:27:12.393778 env[1245]: time="2024-12-13T14:27:12.393730174Z" level=error msg="StopPodSandbox for \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\" failed" error="failed to destroy network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:12.394122 kubelet[1611]: E1213 14:27:12.393991 1611 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Dec 13 14:27:12.394122 kubelet[1611]: E1213 14:27:12.394048 1611 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969"} Dec 13 14:27:12.394122 kubelet[1611]: E1213 14:27:12.394075 1611 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"051561e4-dc35-426c-8f21-884ac342fe36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:27:12.394122 kubelet[1611]: E1213 14:27:12.394094 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"051561e4-dc35-426c-8f21-884ac342fe36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gncsq" podUID="051561e4-dc35-426c-8f21-884ac342fe36" Dec 13 14:27:13.200661 kubelet[1611]: E1213 14:27:13.200626 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:13.304284 kubelet[1611]: I1213 14:27:13.303847 1611 topology_manager.go:215] "Topology Admit Handler" podUID="bcabee75-5034-4afb-800d-6830d301e3ad" podNamespace="default" podName="nginx-deployment-6d5f899847-v6q6w" Dec 13 14:27:13.307239 systemd[1]: Created slice kubepods-besteffort-podbcabee75_5034_4afb_800d_6830d301e3ad.slice. Dec 13 14:27:13.383272 kubelet[1611]: I1213 14:27:13.383247 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5fqdg\" (UniqueName: \"kubernetes.io/projected/bcabee75-5034-4afb-800d-6830d301e3ad-kube-api-access-5fqdg\") pod \"nginx-deployment-6d5f899847-v6q6w\" (UID: \"bcabee75-5034-4afb-800d-6830d301e3ad\") " pod="default/nginx-deployment-6d5f899847-v6q6w" Dec 13 14:27:14.201493 kubelet[1611]: E1213 14:27:14.201463 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:14.209056 env[1245]: time="2024-12-13T14:27:14.209028921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-v6q6w,Uid:bcabee75-5034-4afb-800d-6830d301e3ad,Namespace:default,Attempt:0,}" Dec 13 14:27:14.752297 env[1245]: time="2024-12-13T14:27:14.752254917Z" level=error msg="Failed to destroy network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:14.753563 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851-shm.mount: Deactivated successfully. Dec 13 14:27:14.754201 env[1245]: time="2024-12-13T14:27:14.754175822Z" level=error msg="encountered an error cleaning up failed sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:14.754284 env[1245]: time="2024-12-13T14:27:14.754266491Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-v6q6w,Uid:bcabee75-5034-4afb-800d-6830d301e3ad,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:14.754510 kubelet[1611]: E1213 14:27:14.754489 1611 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:14.754594 kubelet[1611]: E1213 14:27:14.754528 1611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-v6q6w" Dec 13 14:27:14.754594 kubelet[1611]: E1213 14:27:14.754542 1611 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-v6q6w" Dec 13 14:27:14.754594 kubelet[1611]: E1213 14:27:14.754577 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-v6q6w_default(bcabee75-5034-4afb-800d-6830d301e3ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-v6q6w_default(bcabee75-5034-4afb-800d-6830d301e3ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-v6q6w" podUID="bcabee75-5034-4afb-800d-6830d301e3ad" Dec 13 14:27:15.201891 kubelet[1611]: E1213 14:27:15.201864 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:15.380365 kubelet[1611]: I1213 14:27:15.380041 1611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Dec 13 14:27:15.380458 env[1245]: time="2024-12-13T14:27:15.380374908Z" level=info msg="StopPodSandbox for \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\"" Dec 13 14:27:15.434084 env[1245]: time="2024-12-13T14:27:15.434045552Z" level=error msg="StopPodSandbox for \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\" failed" error="failed to destroy network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:15.434355 kubelet[1611]: E1213 14:27:15.434263 1611 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Dec 13 14:27:15.434355 kubelet[1611]: E1213 14:27:15.434289 1611 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851"} Dec 13 14:27:15.434355 kubelet[1611]: E1213 14:27:15.434313 1611 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bcabee75-5034-4afb-800d-6830d301e3ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:27:15.434355 kubelet[1611]: E1213 14:27:15.434332 1611 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bcabee75-5034-4afb-800d-6830d301e3ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-v6q6w" podUID="bcabee75-5034-4afb-800d-6830d301e3ad" Dec 13 14:27:16.202802 kubelet[1611]: E1213 14:27:16.202769 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:16.720911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2252446929.mount: Deactivated successfully. Dec 13 14:27:16.754017 env[1245]: time="2024-12-13T14:27:16.753961298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.755272 env[1245]: time="2024-12-13T14:27:16.755252009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.756558 env[1245]: time="2024-12-13T14:27:16.756543294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.757724 env[1245]: time="2024-12-13T14:27:16.757707385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.757936 env[1245]: time="2024-12-13T14:27:16.757917409Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:27:16.768072 env[1245]: time="2024-12-13T14:27:16.768049302Z" level=info msg="CreateContainer within sandbox \"1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:27:16.776721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1873554916.mount: Deactivated successfully. Dec 13 14:27:16.779945 env[1245]: time="2024-12-13T14:27:16.779911308Z" level=info msg="CreateContainer within sandbox \"1c3901eef982eda3242d3af5635196015a58d3c1d0a0e2dcb1e0b7a26520d916\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"df38e827b0093dc9fb8225c5444104d0534a72e87861a5a9198b6d0d1f79ad11\"" Dec 13 14:27:16.780410 env[1245]: time="2024-12-13T14:27:16.780395573Z" level=info msg="StartContainer for \"df38e827b0093dc9fb8225c5444104d0534a72e87861a5a9198b6d0d1f79ad11\"" Dec 13 14:27:16.790814 systemd[1]: Started cri-containerd-df38e827b0093dc9fb8225c5444104d0534a72e87861a5a9198b6d0d1f79ad11.scope. Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.807973 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:27:16.808094 kernel: audit: type=1400 audit(1734100036.804:534): avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.808118 kernel: audit: type=1300 audit(1734100036.804:534): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd18d8fa4e8 items=0 ppid=1684 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:16.804000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd18d8fa4e8 items=0 ppid=1684 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:16.811770 kernel: audit: type=1327 audit(1734100036.804:534): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333865383237623030393364633966623832323563353434343130 Dec 13 14:27:16.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333865383237623030393364633966623832323563353434343130 Dec 13 14:27:16.817517 kernel: audit: type=1400 audit(1734100036.804:535): avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.817599 kernel: audit: type=1400 audit(1734100036.804:535): avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.822282 kernel: audit: type=1400 audit(1734100036.804:535): avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.822362 kernel: audit: type=1400 audit(1734100036.804:535): avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.824802 kernel: audit: type=1400 audit(1734100036.804:535): avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.829864 kernel: audit: type=1400 audit(1734100036.804:535): avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.829933 kernel: audit: type=1400 audit(1734100036.804:535): avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.804000 audit: BPF prog-id=75 op=LOAD Dec 13 14:27:16.804000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a6108 items=0 ppid=1684 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:16.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333865383237623030393364633966623832323563353434343130 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.811000 audit: BPF prog-id=76 op=LOAD Dec 13 14:27:16.811000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a6158 items=0 ppid=1684 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:16.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333865383237623030393364633966623832323563353434343130 Dec 13 14:27:16.819000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:27:16.819000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:16.819000 audit: BPF prog-id=77 op=LOAD Dec 13 14:27:16.819000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a61e8 items=0 ppid=1684 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:16.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466333865383237623030393364633966623832323563353434343130 Dec 13 14:27:16.844628 env[1245]: time="2024-12-13T14:27:16.843215374Z" level=info msg="StartContainer for \"df38e827b0093dc9fb8225c5444104d0534a72e87861a5a9198b6d0d1f79ad11\" returns successfully" Dec 13 14:27:16.910823 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:27:16.910923 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:27:17.203252 kubelet[1611]: E1213 14:27:17.203220 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:18.077000 audit[2344]: AVC avc: denied { write } for pid=2344 comm="tee" name="fd" dev="proc" ino=30934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:18.077000 audit[2344]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd81c09a2b a2=241 a3=1b6 items=1 ppid=2314 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.077000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:27:18.077000 audit: PATH item=0 name="/dev/fd/63" inode=30923 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:18.077000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:18.081000 audit[2355]: AVC avc: denied { write } for pid=2355 comm="tee" name="fd" dev="proc" ino=30944 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:18.081000 audit[2355]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeca377a1a a2=241 a3=1b6 items=1 ppid=2317 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.081000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:27:18.081000 audit: PATH item=0 name="/dev/fd/63" inode=30931 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:18.081000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:18.093000 audit[2370]: AVC avc: denied { write } for pid=2370 comm="tee" name="fd" dev="proc" ino=30953 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:18.093000 audit[2370]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcae49ea1b a2=241 a3=1b6 items=1 ppid=2318 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.093000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:27:18.093000 audit: PATH item=0 name="/dev/fd/63" inode=30946 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:18.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:18.096000 audit[2362]: AVC avc: denied { write } for pid=2362 comm="tee" name="fd" dev="proc" ino=30185 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:18.098000 audit[2366]: AVC avc: denied { write } for pid=2366 comm="tee" name="fd" dev="proc" ino=30188 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:18.096000 audit[2362]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5189aa2a a2=241 a3=1b6 items=1 ppid=2313 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.096000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:27:18.096000 audit: PATH item=0 name="/dev/fd/63" inode=30163 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:18.096000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:18.099000 audit[2375]: AVC avc: denied { write } for pid=2375 comm="tee" name="fd" dev="proc" ino=30192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:18.098000 audit[2366]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd914e9a2a a2=241 a3=1b6 items=1 ppid=2321 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.098000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:27:18.098000 audit: PATH item=0 name="/dev/fd/63" inode=30168 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:18.098000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:18.103000 audit[2381]: AVC avc: denied { write } for pid=2381 comm="tee" name="fd" dev="proc" ino=30957 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:18.103000 audit[2381]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4a424a2a a2=241 a3=1b6 items=1 ppid=2320 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.103000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:27:18.103000 audit: PATH item=0 name="/dev/fd/63" inode=30950 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:18.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:18.099000 audit[2375]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee1412a2c a2=241 a3=1b6 items=1 ppid=2328 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.099000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:27:18.099000 audit: PATH item=0 name="/dev/fd/63" inode=30176 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:18.099000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:18.204178 kubelet[1611]: E1213 14:27:18.204139 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit: BPF prog-id=78 op=LOAD Dec 13 14:27:18.211000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd66743520 a2=98 a3=3 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.211000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit: BPF prog-id=79 op=LOAD Dec 13 14:27:18.211000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd66743300 a2=74 a3=540051 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.211000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.211000 audit: BPF prog-id=80 op=LOAD Dec 13 14:27:18.211000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd66743330 a2=94 a3=2 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.211000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit: BPF prog-id=81 op=LOAD Dec 13 14:27:18.278000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd667431f0 a2=40 a3=1 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.278000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.278000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:27:18.278000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.278000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd667432c0 a2=50 a3=7ffd667433a0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.278000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd66743200 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd66743230 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd66743140 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd66743250 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd66743230 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd66743220 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd66743250 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd66743230 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd66743250 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd66743220 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd66743290 a2=28 a3=0 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd66743040 a2=50 a3=1 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit: BPF prog-id=82 op=LOAD Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd66743040 a2=94 a3=5 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd667430f0 a2=50 a3=1 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd66743210 a2=4 a3=38 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { confidentiality } for pid=2405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd66743260 a2=94 a3=6 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { confidentiality } for pid=2405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd66742a10 a2=94 a3=83 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.285000 audit[2405]: AVC avc: denied { confidentiality } for pid=2405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:18.285000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd66742a10 a2=94 a3=83 items=0 ppid=2322 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit: BPF prog-id=83 op=LOAD Dec 13 14:27:18.290000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8a385870 a2=98 a3=1999999999999999 items=0 ppid=2322 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.290000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:27:18.290000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit: BPF prog-id=84 op=LOAD Dec 13 14:27:18.290000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8a385750 a2=74 a3=ffff items=0 ppid=2322 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.290000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:27:18.290000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.290000 audit: BPF prog-id=85 op=LOAD Dec 13 14:27:18.290000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8a385790 a2=40 a3=7fff8a385970 items=0 ppid=2322 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.290000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:27:18.290000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:27:18.397884 systemd[1]: run-containerd-runc-k8s.io-df38e827b0093dc9fb8225c5444104d0534a72e87861a5a9198b6d0d1f79ad11-runc.G4O4bN.mount: Deactivated successfully. Dec 13 14:27:18.592701 systemd-networkd[1060]: vxlan.calico: Link UP Dec 13 14:27:18.592706 systemd-networkd[1060]: vxlan.calico: Gained carrier Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit: BPF prog-id=86 op=LOAD Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd70f76f10 a2=98 a3=ffffffff items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit: BPF prog-id=87 op=LOAD Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd70f76d20 a2=74 a3=540051 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit: BPF prog-id=88 op=LOAD Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd70f76d50 a2=94 a3=2 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd70f76c20 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd70f76c50 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd70f76b60 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd70f76c70 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd70f76c50 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd70f76c40 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd70f76c70 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd70f76c50 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd70f76c70 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd70f76c40 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd70f76cb0 a2=28 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.625000 audit: BPF prog-id=89 op=LOAD Dec 13 14:27:18.625000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd70f76b20 a2=40 a3=0 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.625000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd70f76b10 a2=50 a3=2800 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.626000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd70f76b10 a2=50 a3=2800 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.626000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit: BPF prog-id=90 op=LOAD Dec 13 14:27:18.626000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd70f76330 a2=94 a3=2 items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.626000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.626000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.626000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd70f76430 a2=94 a3=2d items=0 ppid=2322 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.626000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit: BPF prog-id=92 op=LOAD Dec 13 14:27:18.628000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc94c51160 a2=98 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.628000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit: BPF prog-id=93 op=LOAD Dec 13 14:27:18.628000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc94c50f40 a2=74 a3=540051 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.628000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.628000 audit: BPF prog-id=94 op=LOAD Dec 13 14:27:18.628000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc94c50f70 a2=94 a3=2 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.628000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit: BPF prog-id=95 op=LOAD Dec 13 14:27:18.697000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc94c50e30 a2=40 a3=1 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.697000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.697000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:27:18.697000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.697000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc94c50f00 a2=50 a3=7ffc94c50fe0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.697000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc94c50e40 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc94c50e70 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc94c50d80 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc94c50e90 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc94c50e70 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc94c50e60 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc94c50e90 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc94c50e70 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc94c50e90 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc94c50e60 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc94c50ed0 a2=28 a3=0 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc94c50c80 a2=50 a3=1 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit: BPF prog-id=96 op=LOAD Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc94c50c80 a2=94 a3=5 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc94c50d30 a2=50 a3=1 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc94c50e50 a2=4 a3=38 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.706000 audit[2482]: AVC avc: denied { confidentiality } for pid=2482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:18.706000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc94c50ea0 a2=94 a3=6 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { confidentiality } for pid=2482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:18.707000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc94c50650 a2=94 a3=83 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { confidentiality } for pid=2482 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:18.707000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc94c50650 a2=94 a3=83 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc94c52090 a2=10 a3=1000 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc94c51f30 a2=10 a3=3 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc94c51ed0 a2=10 a3=3 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.707000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:18.707000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc94c51ed0 a2=10 a3=7 items=0 ppid=2322 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:18.711000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:27:18.829000 audit[2514]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:18.829000 audit[2514]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd592ef8b0 a2=0 a3=7ffd592ef89c items=0 ppid=2322 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.829000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:18.856000 audit[2516]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:18.856000 audit[2516]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd6380ab70 a2=0 a3=7ffd6380ab5c items=0 ppid=2322 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.856000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:18.858000 audit[2517]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:18.858000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdf7f37ca0 a2=0 a3=7ffdf7f37c8c items=0 ppid=2322 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.858000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:18.869000 audit[2515]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2515 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:18.869000 audit[2515]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff7f498eb0 a2=0 a3=7fff7f498e9c items=0 ppid=2322 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:18.869000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:19.204763 kubelet[1611]: E1213 14:27:19.204734 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:19.395144 systemd[1]: run-containerd-runc-k8s.io-df38e827b0093dc9fb8225c5444104d0534a72e87861a5a9198b6d0d1f79ad11-runc.VQNbPG.mount: Deactivated successfully. Dec 13 14:27:19.858785 systemd-networkd[1060]: vxlan.calico: Gained IPv6LL Dec 13 14:27:20.191500 kubelet[1611]: E1213 14:27:20.191466 1611 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:20.205631 kubelet[1611]: E1213 14:27:20.205609 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:21.206231 kubelet[1611]: E1213 14:27:21.206195 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:22.206830 kubelet[1611]: E1213 14:27:22.206803 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:23.207526 kubelet[1611]: E1213 14:27:23.207503 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:24.208594 kubelet[1611]: E1213 14:27:24.208570 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:25.209662 kubelet[1611]: E1213 14:27:25.209609 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:25.353423 env[1245]: time="2024-12-13T14:27:25.353387792Z" level=info msg="StopPodSandbox for \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\"" Dec 13 14:27:25.415393 kubelet[1611]: I1213 14:27:25.415362 1611 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-vg789" podStartSLOduration=11.082759621 podStartE2EDuration="25.415315931s" podCreationTimestamp="2024-12-13 14:27:00 +0000 UTC" firstStartedPulling="2024-12-13 14:27:02.425537421 +0000 UTC m=+2.656265893" lastFinishedPulling="2024-12-13 14:27:16.758093721 +0000 UTC m=+16.988822203" observedRunningTime="2024-12-13 14:27:17.395479158 +0000 UTC m=+17.626207642" watchObservedRunningTime="2024-12-13 14:27:25.415315931 +0000 UTC m=+25.646044411" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.414 [INFO][2578] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.415 [INFO][2578] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" iface="eth0" netns="/var/run/netns/cni-723dd544-78ee-520f-754d-183a741db7b6" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.415 [INFO][2578] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" iface="eth0" netns="/var/run/netns/cni-723dd544-78ee-520f-754d-183a741db7b6" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.417 [INFO][2578] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" iface="eth0" netns="/var/run/netns/cni-723dd544-78ee-520f-754d-183a741db7b6" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.417 [INFO][2578] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.418 [INFO][2578] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.820 [INFO][2584] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" HandleID="k8s-pod-network.3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Workload="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.820 [INFO][2584] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.820 [INFO][2584] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.826 [WARNING][2584] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" HandleID="k8s-pod-network.3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Workload="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.826 [INFO][2584] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" HandleID="k8s-pod-network.3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Workload="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.826 [INFO][2584] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.828682 env[1245]: 2024-12-13 14:27:25.827 [INFO][2578] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969" Dec 13 14:27:25.829723 systemd[1]: run-netns-cni\x2d723dd544\x2d78ee\x2d520f\x2d754d\x2d183a741db7b6.mount: Deactivated successfully. Dec 13 14:27:25.830516 env[1245]: time="2024-12-13T14:27:25.830483000Z" level=info msg="TearDown network for sandbox \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\" successfully" Dec 13 14:27:25.830548 env[1245]: time="2024-12-13T14:27:25.830516052Z" level=info msg="StopPodSandbox for \"3c7c7e28207108fa4e7c5f126db2b9e34f34a19f4a49fd77336babc0df111969\" returns successfully" Dec 13 14:27:25.830988 env[1245]: time="2024-12-13T14:27:25.830971321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gncsq,Uid:051561e4-dc35-426c-8f21-884ac342fe36,Namespace:calico-system,Attempt:1,}" Dec 13 14:27:25.916552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:27:25.916667 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17d31bc585f: link becomes ready Dec 13 14:27:25.916749 systemd-networkd[1060]: cali17d31bc585f: Link UP Dec 13 14:27:25.916864 systemd-networkd[1060]: cali17d31bc585f: Gained carrier Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.863 [INFO][2594] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.131-k8s-csi--node--driver--gncsq-eth0 csi-node-driver- calico-system 051561e4-dc35-426c-8f21-884ac342fe36 1079 0 2024-12-13 14:27:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.131 csi-node-driver-gncsq eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali17d31bc585f [] []}} ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.863 [INFO][2594] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.882 [INFO][2602] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" HandleID="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Workload="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.892 [INFO][2602] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" HandleID="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Workload="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b930), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.131", "pod":"csi-node-driver-gncsq", "timestamp":"2024-12-13 14:27:25.882508401 +0000 UTC"}, Hostname:"10.67.124.131", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.892 [INFO][2602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.892 [INFO][2602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.892 [INFO][2602] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.131' Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.893 [INFO][2602] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.897 [INFO][2602] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.899 [INFO][2602] ipam/ipam.go 489: Trying affinity for 192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.900 [INFO][2602] ipam/ipam.go 155: Attempting to load block cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.901 [INFO][2602] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.901 [INFO][2602] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.18.192/26 handle="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.902 [INFO][2602] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374 Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.904 [INFO][2602] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.18.192/26 handle="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.906 [INFO][2602] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.18.193/26] block=192.168.18.192/26 handle="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.906 [INFO][2602] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.18.193/26] handle="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" host="10.67.124.131" Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.906 [INFO][2602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.942673 env[1245]: 2024-12-13 14:27:25.906 [INFO][2602] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.18.193/26] IPv6=[] ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" HandleID="k8s-pod-network.dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Workload="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.944036 env[1245]: 2024-12-13 14:27:25.908 [INFO][2594] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-csi--node--driver--gncsq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"051561e4-dc35-426c-8f21-884ac342fe36", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"", Pod:"csi-node-driver-gncsq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.18.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali17d31bc585f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.944036 env[1245]: 2024-12-13 14:27:25.908 [INFO][2594] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.18.193/32] ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.944036 env[1245]: 2024-12-13 14:27:25.908 [INFO][2594] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali17d31bc585f ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.944036 env[1245]: 2024-12-13 14:27:25.921 [INFO][2594] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.944036 env[1245]: 2024-12-13 14:27:25.921 [INFO][2594] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-csi--node--driver--gncsq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"051561e4-dc35-426c-8f21-884ac342fe36", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374", Pod:"csi-node-driver-gncsq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.18.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali17d31bc585f", MAC:"32:4b:4e:ea:f5:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.944036 env[1245]: 2024-12-13 14:27:25.941 [INFO][2594] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374" Namespace="calico-system" Pod="csi-node-driver-gncsq" WorkloadEndpoint="10.67.124.131-k8s-csi--node--driver--gncsq-eth0" Dec 13 14:27:25.950000 audit[2616]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2616 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:25.954285 kernel: kauditd_printk_skb: 556 callbacks suppressed Dec 13 14:27:25.954373 kernel: audit: type=1325 audit(1734100045.950:642): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2616 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:25.954394 kernel: audit: type=1300 audit(1734100045.950:642): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcdd410160 a2=0 a3=7ffcdd41014c items=0 ppid=2322 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:25.950000 audit[2616]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcdd410160 a2=0 a3=7ffcdd41014c items=0 ppid=2322 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:25.950000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:25.960676 kernel: audit: type=1327 audit(1734100045.950:642): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:25.966653 env[1245]: time="2024-12-13T14:27:25.966534675Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:25.966653 env[1245]: time="2024-12-13T14:27:25.966567025Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:25.966653 env[1245]: time="2024-12-13T14:27:25.966574136Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:25.966958 env[1245]: time="2024-12-13T14:27:25.966928888Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374 pid=2630 runtime=io.containerd.runc.v2 Dec 13 14:27:25.976567 systemd[1]: Started cri-containerd-dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374.scope. Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.992205 kernel: audit: type=1400 audit(1734100045.986:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.992271 kernel: audit: type=1400 audit(1734100045.986:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.992287 kernel: audit: type=1400 audit(1734100045.986:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.994696 kernel: audit: type=1400 audit(1734100045.986:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.999670 kernel: audit: type=1400 audit(1734100045.986:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.999739 kernel: audit: type=1400 audit(1734100045.986:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.005245 kernel: audit: type=1400 audit(1734100045.986:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit: BPF prog-id=97 op=LOAD Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2630 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:25.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461633933616666353137643635326134356433636430383239643636 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2630 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:25.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461633933616666353137643635326134356433636430383239643636 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.989000 audit: BPF prog-id=98 op=LOAD Dec 13 14:27:25.989000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001e6b60 items=0 ppid=2630 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:25.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461633933616666353137643635326134356433636430383239643636 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.991000 audit: BPF prog-id=99 op=LOAD Dec 13 14:27:25.991000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001e6ba8 items=0 ppid=2630 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:25.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461633933616666353137643635326134356433636430383239643636 Dec 13 14:27:25.996000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:27:25.996000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:25.996000 audit: BPF prog-id=100 op=LOAD Dec 13 14:27:25.996000 audit[2641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001e6fb8 items=0 ppid=2630 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:25.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461633933616666353137643635326134356433636430383239643636 Dec 13 14:27:26.005001 systemd-resolved[1202]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:27:26.015335 env[1245]: time="2024-12-13T14:27:26.015308083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gncsq,Uid:051561e4-dc35-426c-8f21-884ac342fe36,Namespace:calico-system,Attempt:1,} returns sandbox id \"dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374\"" Dec 13 14:27:26.016564 env[1245]: time="2024-12-13T14:27:26.016547783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:27:26.210627 kubelet[1611]: E1213 14:27:26.210581 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:26.353329 env[1245]: time="2024-12-13T14:27:26.353297174Z" level=info msg="StopPodSandbox for \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\"" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.380 [INFO][2677] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.380 [INFO][2677] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" iface="eth0" netns="/var/run/netns/cni-3c6fdcdb-6b99-d7df-0940-08383e85930c" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.380 [INFO][2677] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" iface="eth0" netns="/var/run/netns/cni-3c6fdcdb-6b99-d7df-0940-08383e85930c" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.380 [INFO][2677] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" iface="eth0" netns="/var/run/netns/cni-3c6fdcdb-6b99-d7df-0940-08383e85930c" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.380 [INFO][2677] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.380 [INFO][2677] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.395 [INFO][2684] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" HandleID="k8s-pod-network.1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Workload="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.395 [INFO][2684] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.395 [INFO][2684] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.399 [WARNING][2684] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" HandleID="k8s-pod-network.1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Workload="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.399 [INFO][2684] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" HandleID="k8s-pod-network.1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Workload="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.400 [INFO][2684] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:26.402429 env[1245]: 2024-12-13 14:27:26.401 [INFO][2677] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851" Dec 13 14:27:26.403116 env[1245]: time="2024-12-13T14:27:26.402636638Z" level=info msg="TearDown network for sandbox \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\" successfully" Dec 13 14:27:26.403116 env[1245]: time="2024-12-13T14:27:26.402663779Z" level=info msg="StopPodSandbox for \"1a902f77dba5d7d4cca9568ea9eca3651e8ac67a7ce7fb7dcc05c6e16b24e851\" returns successfully" Dec 13 14:27:26.403214 env[1245]: time="2024-12-13T14:27:26.403179888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-v6q6w,Uid:bcabee75-5034-4afb-800d-6830d301e3ad,Namespace:default,Attempt:1,}" Dec 13 14:27:26.488716 systemd-networkd[1060]: calic0edc79c98f: Link UP Dec 13 14:27:26.490305 systemd-networkd[1060]: calic0edc79c98f: Gained carrier Dec 13 14:27:26.490627 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic0edc79c98f: link becomes ready Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.433 [INFO][2690] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0 nginx-deployment-6d5f899847- default bcabee75-5034-4afb-800d-6830d301e3ad 1087 0 2024-12-13 14:27:13 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.131 nginx-deployment-6d5f899847-v6q6w eth0 default [] [] [kns.default ksa.default.default] calic0edc79c98f [] []}} ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.433 [INFO][2690] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.450 [INFO][2703] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" HandleID="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Workload="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.457 [INFO][2703] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" HandleID="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Workload="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318ea0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.131", "pod":"nginx-deployment-6d5f899847-v6q6w", "timestamp":"2024-12-13 14:27:26.450190396 +0000 UTC"}, Hostname:"10.67.124.131", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.457 [INFO][2703] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.457 [INFO][2703] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.457 [INFO][2703] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.131' Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.458 [INFO][2703] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.461 [INFO][2703] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.463 [INFO][2703] ipam/ipam.go 489: Trying affinity for 192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.464 [INFO][2703] ipam/ipam.go 155: Attempting to load block cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.465 [INFO][2703] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.465 [INFO][2703] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.18.192/26 handle="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.466 [INFO][2703] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8 Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.472 [INFO][2703] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.18.192/26 handle="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.485 [INFO][2703] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.18.194/26] block=192.168.18.192/26 handle="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.485 [INFO][2703] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.18.194/26] handle="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" host="10.67.124.131" Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.485 [INFO][2703] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:26.504660 env[1245]: 2024-12-13 14:27:26.485 [INFO][2703] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.18.194/26] IPv6=[] ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" HandleID="k8s-pod-network.3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Workload="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.505123 env[1245]: 2024-12-13 14:27:26.486 [INFO][2690] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"bcabee75-5034-4afb-800d-6830d301e3ad", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"", Pod:"nginx-deployment-6d5f899847-v6q6w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.18.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic0edc79c98f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:26.505123 env[1245]: 2024-12-13 14:27:26.486 [INFO][2690] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.18.194/32] ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.505123 env[1245]: 2024-12-13 14:27:26.486 [INFO][2690] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic0edc79c98f ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.505123 env[1245]: 2024-12-13 14:27:26.488 [INFO][2690] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.505123 env[1245]: 2024-12-13 14:27:26.490 [INFO][2690] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"bcabee75-5034-4afb-800d-6830d301e3ad", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8", Pod:"nginx-deployment-6d5f899847-v6q6w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.18.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic0edc79c98f", MAC:"f6:46:3d:00:84:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:26.505123 env[1245]: 2024-12-13 14:27:26.500 [INFO][2690] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8" Namespace="default" Pod="nginx-deployment-6d5f899847-v6q6w" WorkloadEndpoint="10.67.124.131-k8s-nginx--deployment--6d5f899847--v6q6w-eth0" Dec 13 14:27:26.506000 audit[2715]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:26.506000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffebd77e620 a2=0 a3=7ffebd77e60c items=0 ppid=2322 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:26.506000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:26.517651 env[1245]: time="2024-12-13T14:27:26.517570047Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:26.517805 env[1245]: time="2024-12-13T14:27:26.517642311Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:26.517805 env[1245]: time="2024-12-13T14:27:26.517652625Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:26.517924 env[1245]: time="2024-12-13T14:27:26.517824068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8 pid=2733 runtime=io.containerd.runc.v2 Dec 13 14:27:26.525850 systemd[1]: Started cri-containerd-3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8.scope. Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.534000 audit: BPF prog-id=101 op=LOAD Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2733 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:26.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353735656632303737616164616435623137643831316437316239 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2733 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:26.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353735656632303737616164616435623137643831316437316239 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.535000 audit: BPF prog-id=102 op=LOAD Dec 13 14:27:26.535000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003f8d90 items=0 ppid=2733 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:26.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353735656632303737616164616435623137643831316437316239 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit: BPF prog-id=103 op=LOAD Dec 13 14:27:26.536000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003f8dd8 items=0 ppid=2733 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:26.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353735656632303737616164616435623137643831316437316239 Dec 13 14:27:26.536000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:27:26.536000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:26.536000 audit: BPF prog-id=104 op=LOAD Dec 13 14:27:26.536000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f91e8 items=0 ppid=2733 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:26.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353735656632303737616164616435623137643831316437316239 Dec 13 14:27:26.538301 systemd-resolved[1202]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:27:26.558295 env[1245]: time="2024-12-13T14:27:26.558269903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-v6q6w,Uid:bcabee75-5034-4afb-800d-6830d301e3ad,Namespace:default,Attempt:1,} returns sandbox id \"3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8\"" Dec 13 14:27:26.831360 systemd[1]: run-netns-cni\x2d3c6fdcdb\x2d6b99\x2dd7df\x2d0940\x2d08383e85930c.mount: Deactivated successfully. Dec 13 14:27:27.211211 kubelet[1611]: E1213 14:27:27.211171 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:27.218781 systemd-networkd[1060]: cali17d31bc585f: Gained IPv6LL Dec 13 14:27:27.381994 env[1245]: time="2024-12-13T14:27:27.381960105Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:27.382911 env[1245]: time="2024-12-13T14:27:27.382893912Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:27.383726 env[1245]: time="2024-12-13T14:27:27.383712572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:27.384356 env[1245]: time="2024-12-13T14:27:27.384344052Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:27.384701 env[1245]: time="2024-12-13T14:27:27.384685828Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:27:27.385488 env[1245]: time="2024-12-13T14:27:27.385475281Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:27:27.386194 env[1245]: time="2024-12-13T14:27:27.386179732Z" level=info msg="CreateContainer within sandbox \"dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:27:27.392294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1492274560.mount: Deactivated successfully. Dec 13 14:27:27.394664 env[1245]: time="2024-12-13T14:27:27.394645239Z" level=info msg="CreateContainer within sandbox \"dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"fb502e9215caff422b935aa729c2858c4489d11158969150d5aba5191ac637b7\"" Dec 13 14:27:27.395201 env[1245]: time="2024-12-13T14:27:27.395188636Z" level=info msg="StartContainer for \"fb502e9215caff422b935aa729c2858c4489d11158969150d5aba5191ac637b7\"" Dec 13 14:27:27.410837 systemd[1]: Started cri-containerd-fb502e9215caff422b935aa729c2858c4489d11158969150d5aba5191ac637b7.scope. Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9510076c28 items=0 ppid=2630 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:27.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353032653932313563616666343232623933356161373239633238 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit: BPF prog-id=105 op=LOAD Dec 13 14:27:27.421000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001be588 items=0 ppid=2630 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:27.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353032653932313563616666343232623933356161373239633238 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit: BPF prog-id=106 op=LOAD Dec 13 14:27:27.421000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001be5d8 items=0 ppid=2630 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:27.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353032653932313563616666343232623933356161373239633238 Dec 13 14:27:27.421000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:27:27.421000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:27.421000 audit: BPF prog-id=107 op=LOAD Dec 13 14:27:27.421000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001be668 items=0 ppid=2630 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:27.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353032653932313563616666343232623933356161373239633238 Dec 13 14:27:27.432572 env[1245]: time="2024-12-13T14:27:27.432083687Z" level=info msg="StartContainer for \"fb502e9215caff422b935aa729c2858c4489d11158969150d5aba5191ac637b7\" returns successfully" Dec 13 14:27:27.829907 systemd[1]: run-containerd-runc-k8s.io-fb502e9215caff422b935aa729c2858c4489d11158969150d5aba5191ac637b7-runc.h31g2o.mount: Deactivated successfully. Dec 13 14:27:28.211646 kubelet[1611]: E1213 14:27:28.211615 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:28.370788 systemd-networkd[1060]: calic0edc79c98f: Gained IPv6LL Dec 13 14:27:29.212444 kubelet[1611]: E1213 14:27:29.212420 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:29.918906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2526850599.mount: Deactivated successfully. Dec 13 14:27:30.213392 kubelet[1611]: E1213 14:27:30.213270 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:30.924708 env[1245]: time="2024-12-13T14:27:30.924668289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:30.925473 env[1245]: time="2024-12-13T14:27:30.925454730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:30.926514 env[1245]: time="2024-12-13T14:27:30.926499014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:30.927485 env[1245]: time="2024-12-13T14:27:30.927469343Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:30.928019 env[1245]: time="2024-12-13T14:27:30.928000314Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:27:30.928718 env[1245]: time="2024-12-13T14:27:30.928698821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:27:30.930331 env[1245]: time="2024-12-13T14:27:30.930309107Z" level=info msg="CreateContainer within sandbox \"3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:27:30.935961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2543308961.mount: Deactivated successfully. Dec 13 14:27:30.939778 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount962232526.mount: Deactivated successfully. Dec 13 14:27:30.947125 env[1245]: time="2024-12-13T14:27:30.947107037Z" level=info msg="CreateContainer within sandbox \"3e575ef2077aadad5b17d811d71b971b9db1d5be55e74b81a7b10620e0f987f8\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"9404cd5a77ff7168a8ae2f0224ed3ff95182eab5980250c54ff4ecd3aeac2a8d\"" Dec 13 14:27:30.947565 env[1245]: time="2024-12-13T14:27:30.947552841Z" level=info msg="StartContainer for \"9404cd5a77ff7168a8ae2f0224ed3ff95182eab5980250c54ff4ecd3aeac2a8d\"" Dec 13 14:27:30.958278 systemd[1]: Started cri-containerd-9404cd5a77ff7168a8ae2f0224ed3ff95182eab5980250c54ff4ecd3aeac2a8d.scope. Dec 13 14:27:30.974615 kernel: kauditd_printk_skb: 153 callbacks suppressed Dec 13 14:27:30.974682 kernel: audit: type=1400 audit(1734100050.966:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974702 kernel: audit: type=1400 audit(1734100050.966:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974717 kernel: audit: type=1400 audit(1734100050.966:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.977662 kernel: audit: type=1400 audit(1734100050.966:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.982689 kernel: audit: type=1400 audit(1734100050.966:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.982722 kernel: audit: type=1400 audit(1734100050.966:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.985255 kernel: audit: type=1400 audit(1734100050.966:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.990928 kernel: audit: type=1400 audit(1734100050.966:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.990964 kernel: audit: type=1400 audit(1734100050.966:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.994635 kernel: audit: type=1400 audit(1734100050.969:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit: BPF prog-id=108 op=LOAD Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2733 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:30.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303463643561373766663731363861386165326630323234656433 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2733 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:30.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303463643561373766663731363861386165326630323234656433 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.969000 audit: BPF prog-id=109 op=LOAD Dec 13 14:27:30.969000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e7fb0 items=0 ppid=2733 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:30.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303463643561373766663731363861386165326630323234656433 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit: BPF prog-id=110 op=LOAD Dec 13 14:27:30.974000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e7ff8 items=0 ppid=2733 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:30.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303463643561373766663731363861386165326630323234656433 Dec 13 14:27:30.974000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:27:30.974000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:30.974000 audit: BPF prog-id=111 op=LOAD Dec 13 14:27:30.974000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000342408 items=0 ppid=2733 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:30.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303463643561373766663731363861386165326630323234656433 Dec 13 14:27:31.000150 env[1245]: time="2024-12-13T14:27:30.999860732Z" level=info msg="StartContainer for \"9404cd5a77ff7168a8ae2f0224ed3ff95182eab5980250c54ff4ecd3aeac2a8d\" returns successfully" Dec 13 14:27:31.214208 kubelet[1611]: E1213 14:27:31.214101 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:32.215134 kubelet[1611]: E1213 14:27:32.215102 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:32.390225 env[1245]: time="2024-12-13T14:27:32.390196005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:32.401682 env[1245]: time="2024-12-13T14:27:32.401663135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:32.409826 env[1245]: time="2024-12-13T14:27:32.409802957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:32.416810 env[1245]: time="2024-12-13T14:27:32.416791570Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:32.417194 env[1245]: time="2024-12-13T14:27:32.417175551Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:27:32.418582 env[1245]: time="2024-12-13T14:27:32.418555935Z" level=info msg="CreateContainer within sandbox \"dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:27:32.453153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3929218375.mount: Deactivated successfully. Dec 13 14:27:32.461464 env[1245]: time="2024-12-13T14:27:32.461431539Z" level=info msg="CreateContainer within sandbox \"dac93aff517d652a45d3cd0829d668957762b0152db30fa19cd4baa189668374\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"aa82755d0a67b6147f6665c1f9afeeac035a554d96ce4eb2a17a30c1acaca3b8\"" Dec 13 14:27:32.462011 env[1245]: time="2024-12-13T14:27:32.461981296Z" level=info msg="StartContainer for \"aa82755d0a67b6147f6665c1f9afeeac035a554d96ce4eb2a17a30c1acaca3b8\"" Dec 13 14:27:32.482524 systemd[1]: Started cri-containerd-aa82755d0a67b6147f6665c1f9afeeac035a554d96ce4eb2a17a30c1acaca3b8.scope. Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fce67d65ec8 items=0 ppid=2630 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:32.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161383237353564306136376236313437663636363563316639616665 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.489000 audit: BPF prog-id=112 op=LOAD Dec 13 14:27:32.489000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d6db8 items=0 ppid=2630 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:32.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161383237353564306136376236313437663636363563316639616665 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit: BPF prog-id=113 op=LOAD Dec 13 14:27:32.490000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d6e08 items=0 ppid=2630 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:32.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161383237353564306136376236313437663636363563316639616665 Dec 13 14:27:32.490000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:27:32.490000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { perfmon } for pid=2871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit[2871]: AVC avc: denied { bpf } for pid=2871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:32.490000 audit: BPF prog-id=114 op=LOAD Dec 13 14:27:32.490000 audit[2871]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d6e98 items=0 ppid=2630 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:32.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161383237353564306136376236313437663636363563316639616665 Dec 13 14:27:32.504624 env[1245]: time="2024-12-13T14:27:32.504575862Z" level=info msg="StartContainer for \"aa82755d0a67b6147f6665c1f9afeeac035a554d96ce4eb2a17a30c1acaca3b8\" returns successfully" Dec 13 14:27:32.933994 systemd[1]: run-containerd-runc-k8s.io-aa82755d0a67b6147f6665c1f9afeeac035a554d96ce4eb2a17a30c1acaca3b8-runc.ffojOJ.mount: Deactivated successfully. Dec 13 14:27:33.215320 kubelet[1611]: E1213 14:27:33.215221 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:33.289067 kubelet[1611]: I1213 14:27:33.289022 1611 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:27:33.290337 kubelet[1611]: I1213 14:27:33.290324 1611 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:27:33.417542 kubelet[1611]: I1213 14:27:33.417520 1611 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-gncsq" podStartSLOduration=27.016378111 podStartE2EDuration="33.4174912s" podCreationTimestamp="2024-12-13 14:27:00 +0000 UTC" firstStartedPulling="2024-12-13 14:27:26.016271694 +0000 UTC m=+26.247000170" lastFinishedPulling="2024-12-13 14:27:32.417384779 +0000 UTC m=+32.648113259" observedRunningTime="2024-12-13 14:27:33.416800362 +0000 UTC m=+33.647528845" watchObservedRunningTime="2024-12-13 14:27:33.4174912 +0000 UTC m=+33.648219677" Dec 13 14:27:33.417859 kubelet[1611]: I1213 14:27:33.417846 1611 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-v6q6w" podStartSLOduration=16.048671347 podStartE2EDuration="20.417823691s" podCreationTimestamp="2024-12-13 14:27:13 +0000 UTC" firstStartedPulling="2024-12-13 14:27:26.559070879 +0000 UTC m=+26.789799352" lastFinishedPulling="2024-12-13 14:27:30.928223218 +0000 UTC m=+31.158951696" observedRunningTime="2024-12-13 14:27:31.41049396 +0000 UTC m=+31.641222438" watchObservedRunningTime="2024-12-13 14:27:33.417823691 +0000 UTC m=+33.648552184" Dec 13 14:27:34.216024 kubelet[1611]: E1213 14:27:34.215987 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:35.217069 kubelet[1611]: E1213 14:27:35.217045 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:36.218013 kubelet[1611]: E1213 14:27:36.217976 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:37.218916 kubelet[1611]: E1213 14:27:37.218880 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:37.304000 audit[2908]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.305948 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 14:27:37.305988 kernel: audit: type=1325 audit(1734100057.304:710): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.304000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffc9ebe3c0 a2=0 a3=7fffc9ebe3ac items=0 ppid=1785 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.311645 kernel: audit: type=1300 audit(1734100057.304:710): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffc9ebe3c0 a2=0 a3=7fffc9ebe3ac items=0 ppid=1785 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.313510 kernel: audit: type=1327 audit(1734100057.304:710): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.313542 kernel: audit: type=1325 audit(1734100057.311:711): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.311000 audit[2908]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.315353 kernel: audit: type=1300 audit(1734100057.311:711): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc9ebe3c0 a2=0 a3=0 items=0 ppid=1785 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.311000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc9ebe3c0 a2=0 a3=0 items=0 ppid=1785 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.320832 kernel: audit: type=1327 audit(1734100057.311:711): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.320866 kernel: audit: type=1325 audit(1734100057.318:712): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.318000 audit[2912]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.318000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffdab42ea0 a2=0 a3=7fffdab42e8c items=0 ppid=1785 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.326476 kernel: audit: type=1300 audit(1734100057.318:712): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffdab42ea0 a2=0 a3=7fffdab42e8c items=0 ppid=1785 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.326503 kernel: audit: type=1327 audit(1734100057.318:712): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.326000 audit[2912]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.330062 kernel: audit: type=1325 audit(1734100057.326:713): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.326000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffdab42ea0 a2=0 a3=0 items=0 ppid=1785 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.457811 kubelet[1611]: I1213 14:27:37.457786 1611 topology_manager.go:215] "Topology Admit Handler" podUID="4c4980eb-094f-4904-881a-83869128d5b3" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:27:37.460876 systemd[1]: Created slice kubepods-besteffort-pod4c4980eb_094f_4904_881a_83869128d5b3.slice. Dec 13 14:27:37.585514 kubelet[1611]: I1213 14:27:37.585443 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/4c4980eb-094f-4904-881a-83869128d5b3-data\") pod \"nfs-server-provisioner-0\" (UID: \"4c4980eb-094f-4904-881a-83869128d5b3\") " pod="default/nfs-server-provisioner-0" Dec 13 14:27:37.585514 kubelet[1611]: I1213 14:27:37.585470 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lnrmx\" (UniqueName: \"kubernetes.io/projected/4c4980eb-094f-4904-881a-83869128d5b3-kube-api-access-lnrmx\") pod \"nfs-server-provisioner-0\" (UID: \"4c4980eb-094f-4904-881a-83869128d5b3\") " pod="default/nfs-server-provisioner-0" Dec 13 14:27:37.763911 env[1245]: time="2024-12-13T14:27:37.763857533Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:4c4980eb-094f-4904-881a-83869128d5b3,Namespace:default,Attempt:0,}" Dec 13 14:27:38.009852 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:27:38.009998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:27:38.010394 systemd-networkd[1060]: cali60e51b789ff: Link UP Dec 13 14:27:38.010525 systemd-networkd[1060]: cali60e51b789ff: Gained carrier Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.800 [INFO][2915] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.131-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 4c4980eb-094f-4904-881a-83869128d5b3 1150 0 2024-12-13 14:27:37 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.131 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.800 [INFO][2915] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.903 [INFO][2927] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" HandleID="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Workload="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.951 [INFO][2927] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" HandleID="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Workload="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318e90), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.131", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:27:37.902992877 +0000 UTC"}, Hostname:"10.67.124.131", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.951 [INFO][2927] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.952 [INFO][2927] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.952 [INFO][2927] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.131' Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.954 [INFO][2927] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.975 [INFO][2927] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.981 [INFO][2927] ipam/ipam.go 489: Trying affinity for 192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.982 [INFO][2927] ipam/ipam.go 155: Attempting to load block cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.984 [INFO][2927] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.984 [INFO][2927] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.18.192/26 handle="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.985 [INFO][2927] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:37.994 [INFO][2927] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.18.192/26 handle="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:38.003 [INFO][2927] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.18.195/26] block=192.168.18.192/26 handle="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:38.003 [INFO][2927] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.18.195/26] handle="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" host="10.67.124.131" Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:38.003 [INFO][2927] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:38.025872 env[1245]: 2024-12-13 14:27:38.003 [INFO][2927] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.18.195/26] IPv6=[] ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" HandleID="k8s-pod-network.c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Workload="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:38.026488 env[1245]: 2024-12-13 14:27:38.005 [INFO][2915] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"4c4980eb-094f-4904-881a-83869128d5b3", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.18.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:38.026488 env[1245]: 2024-12-13 14:27:38.005 [INFO][2915] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.18.195/32] ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:38.026488 env[1245]: 2024-12-13 14:27:38.005 [INFO][2915] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:38.026488 env[1245]: 2024-12-13 14:27:38.011 [INFO][2915] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:38.026663 env[1245]: 2024-12-13 14:27:38.011 [INFO][2915] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"4c4980eb-094f-4904-881a-83869128d5b3", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.18.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"4e:0e:ef:07:2e:fe", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:38.026663 env[1245]: 2024-12-13 14:27:38.024 [INFO][2915] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.131-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:38.065518 env[1245]: time="2024-12-13T14:27:38.065467378Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:38.065676 env[1245]: time="2024-12-13T14:27:38.065646890Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:38.065676 env[1245]: time="2024-12-13T14:27:38.065662354Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:38.065920 env[1245]: time="2024-12-13T14:27:38.065887148Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc pid=2952 runtime=io.containerd.runc.v2 Dec 13 14:27:38.078313 systemd[1]: Started cri-containerd-c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc.scope. Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit: BPF prog-id=115 op=LOAD Dec 13 14:27:38.090000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.090000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2952 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335303736633832613435316562323534613533313066366465316364 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2952 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335303736633832613435316562323534613533313066366465316364 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit: BPF prog-id=116 op=LOAD Dec 13 14:27:38.091000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003f8670 items=0 ppid=2952 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335303736633832613435316562323534613533313066366465316364 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.091000 audit: BPF prog-id=117 op=LOAD Dec 13 14:27:38.091000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003f86b8 items=0 ppid=2952 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335303736633832613435316562323534613533313066366465316364 Dec 13 14:27:38.092000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:27:38.092000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:38.092000 audit: BPF prog-id=118 op=LOAD Dec 13 14:27:38.092000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f8ac8 items=0 ppid=2952 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335303736633832613435316562323534613533313066366465316364 Dec 13 14:27:38.093883 systemd-resolved[1202]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:27:38.110000 audit[2982]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:38.110000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc99b547a0 a2=0 a3=7ffc99b5478c items=0 ppid=2322 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.110000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:38.112950 env[1245]: time="2024-12-13T14:27:38.112929180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:4c4980eb-094f-4904-881a-83869128d5b3,Namespace:default,Attempt:0,} returns sandbox id \"c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc\"" Dec 13 14:27:38.114030 env[1245]: time="2024-12-13T14:27:38.114018722Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:27:38.219913 kubelet[1611]: E1213 14:27:38.219871 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:38.697903 systemd[1]: run-containerd-runc-k8s.io-c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc-runc.YU5j3l.mount: Deactivated successfully. Dec 13 14:27:39.220297 kubelet[1611]: E1213 14:27:39.220268 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:39.635199 systemd-networkd[1060]: cali60e51b789ff: Gained IPv6LL Dec 13 14:27:40.098954 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3484423216.mount: Deactivated successfully. Dec 13 14:27:40.190867 kubelet[1611]: E1213 14:27:40.190838 1611 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:40.221340 kubelet[1611]: E1213 14:27:40.221309 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:41.222009 kubelet[1611]: E1213 14:27:41.221966 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:41.675425 env[1245]: time="2024-12-13T14:27:41.675400555Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:41.690951 env[1245]: time="2024-12-13T14:27:41.690900904Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:41.696744 env[1245]: time="2024-12-13T14:27:41.696720033Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:41.703319 env[1245]: time="2024-12-13T14:27:41.703296350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:41.704064 env[1245]: time="2024-12-13T14:27:41.704044458Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:27:41.711509 env[1245]: time="2024-12-13T14:27:41.711483997Z" level=info msg="CreateContainer within sandbox \"c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:27:41.737913 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1251342436.mount: Deactivated successfully. Dec 13 14:27:41.742083 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3547893098.mount: Deactivated successfully. Dec 13 14:27:41.760060 env[1245]: time="2024-12-13T14:27:41.760033886Z" level=info msg="CreateContainer within sandbox \"c5076c82a451eb254a5310f6de1cdb393857dd5514183eea075a81b093cf75bc\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"6eaf8634c376d47888a8ba26e8682b7e3ff3f0442ea5f576c14d177c30b14a83\"" Dec 13 14:27:41.760416 env[1245]: time="2024-12-13T14:27:41.760403377Z" level=info msg="StartContainer for \"6eaf8634c376d47888a8ba26e8682b7e3ff3f0442ea5f576c14d177c30b14a83\"" Dec 13 14:27:41.774975 systemd[1]: Started cri-containerd-6eaf8634c376d47888a8ba26e8682b7e3ff3f0442ea5f576c14d177c30b14a83.scope. Dec 13 14:27:41.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit: BPF prog-id=119 op=LOAD Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2952 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:41.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616638363334633337366434373838386138626132366538363832 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2952 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:41.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616638363334633337366434373838386138626132366538363832 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit: BPF prog-id=120 op=LOAD Dec 13 14:27:41.785000 audit[3002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000252c30 items=0 ppid=2952 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:41.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616638363334633337366434373838386138626132366538363832 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit: BPF prog-id=121 op=LOAD Dec 13 14:27:41.785000 audit[3002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000252c78 items=0 ppid=2952 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:41.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616638363334633337366434373838386138626132366538363832 Dec 13 14:27:41.785000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:27:41.785000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { perfmon } for pid=3002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit[3002]: AVC avc: denied { bpf } for pid=3002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:41.785000 audit: BPF prog-id=122 op=LOAD Dec 13 14:27:41.785000 audit[3002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000253088 items=0 ppid=2952 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:41.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665616638363334633337366434373838386138626132366538363832 Dec 13 14:27:41.796372 env[1245]: time="2024-12-13T14:27:41.796348546Z" level=info msg="StartContainer for \"6eaf8634c376d47888a8ba26e8682b7e3ff3f0442ea5f576c14d177c30b14a83\" returns successfully" Dec 13 14:27:41.820000 audit[3029]: AVC avc: denied { search } for pid=3029 comm="rpcbind" name="crypto" dev="proc" ino=34141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:27:41.820000 audit[3029]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc8e54680c0 a2=0 a3=0 items=0 ppid=3011 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 key=(null) Dec 13 14:27:41.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:27:41.840000 audit[3034]: AVC avc: denied { search } for pid=3034 comm="dbus-daemon" name="crypto" dev="proc" ino=34141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:27:41.840000 audit[3034]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa9be1870c0 a2=0 a3=0 items=0 ppid=3011 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 key=(null) Dec 13 14:27:41.840000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:27:41.842000 audit[3035]: AVC avc: denied { watch } for pid=3035 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=529735 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c409,c536 tclass=dir permissive=0 Dec 13 14:27:41.842000 audit[3035]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55f1dcfff040 a2=2c8 a3=7ffd2c0cf47c items=0 ppid=3011 pid=3035 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 key=(null) Dec 13 14:27:41.842000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:27:41.844000 audit[3036]: AVC avc: denied { read } for pid=3036 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34170 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:27:41.844000 audit[3036]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fdcdd84e320 a1=80000 a2=d a3=7ffcd34a1430 items=0 ppid=3011 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 key=(null) Dec 13 14:27:41.844000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:27:41.844000 audit[3036]: AVC avc: denied { search } for pid=3036 comm="ganesha.nfsd" name="crypto" dev="proc" ino=34141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:27:41.844000 audit[3036]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdcdcda20c0 a2=0 a3=0 items=0 ppid=3011 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c536 key=(null) Dec 13 14:27:41.844000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:27:42.222946 kubelet[1611]: E1213 14:27:42.222913 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:42.467000 audit[3077]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.469159 kernel: kauditd_printk_skb: 134 callbacks suppressed Dec 13 14:27:42.469198 kernel: audit: type=1325 audit(1734100062.467:756): table=filter:76 family=2 entries=20 op=nft_register_rule pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.471035 kernel: audit: type=1300 audit(1734100062.467:756): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeee4e5da0 a2=0 a3=7ffeee4e5d8c items=0 ppid=1785 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.467000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeee4e5da0 a2=0 a3=7ffeee4e5d8c items=0 ppid=1785 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:42.476617 kernel: audit: type=1327 audit(1734100062.467:756): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:42.480000 audit[3077]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.486769 kernel: audit: type=1325 audit(1734100062.480:757): table=nat:77 family=2 entries=106 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.486795 kernel: audit: type=1300 audit(1734100062.480:757): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffeee4e5da0 a2=0 a3=7ffeee4e5d8c items=0 ppid=1785 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.486811 kernel: audit: type=1327 audit(1734100062.480:757): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:42.480000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffeee4e5da0 a2=0 a3=7ffeee4e5d8c items=0 ppid=1785 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:43.223795 kubelet[1611]: E1213 14:27:43.223764 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:44.224080 kubelet[1611]: E1213 14:27:44.224054 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:45.225367 kubelet[1611]: E1213 14:27:45.225300 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:46.226590 kubelet[1611]: E1213 14:27:46.226430 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:47.227129 kubelet[1611]: E1213 14:27:47.227096 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:48.228055 kubelet[1611]: E1213 14:27:48.227994 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:49.229107 kubelet[1611]: E1213 14:27:49.229080 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:50.230271 kubelet[1611]: E1213 14:27:50.230247 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:51.028312 kubelet[1611]: I1213 14:27:51.028293 1611 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=10.437644599 podStartE2EDuration="14.028257444s" podCreationTimestamp="2024-12-13 14:27:37 +0000 UTC" firstStartedPulling="2024-12-13 14:27:38.113669044 +0000 UTC m=+38.344397520" lastFinishedPulling="2024-12-13 14:27:41.704281884 +0000 UTC m=+41.935010365" observedRunningTime="2024-12-13 14:27:42.431809727 +0000 UTC m=+42.662538219" watchObservedRunningTime="2024-12-13 14:27:51.028257444 +0000 UTC m=+51.258985923" Dec 13 14:27:51.028638 kubelet[1611]: I1213 14:27:51.028627 1611 topology_manager.go:215] "Topology Admit Handler" podUID="0ceb1a69-573f-4c66-924e-ed7359151817" podNamespace="default" podName="test-pod-1" Dec 13 14:27:51.032027 systemd[1]: Created slice kubepods-besteffort-pod0ceb1a69_573f_4c66_924e_ed7359151817.slice. Dec 13 14:27:51.158526 kubelet[1611]: I1213 14:27:51.158491 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fwtvv\" (UniqueName: \"kubernetes.io/projected/0ceb1a69-573f-4c66-924e-ed7359151817-kube-api-access-fwtvv\") pod \"test-pod-1\" (UID: \"0ceb1a69-573f-4c66-924e-ed7359151817\") " pod="default/test-pod-1" Dec 13 14:27:51.158666 kubelet[1611]: I1213 14:27:51.158535 1611 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-e5237764-e671-4e7d-ab06-7eea3dcb1e8b\" (UniqueName: \"kubernetes.io/nfs/0ceb1a69-573f-4c66-924e-ed7359151817-pvc-e5237764-e671-4e7d-ab06-7eea3dcb1e8b\") pod \"test-pod-1\" (UID: \"0ceb1a69-573f-4c66-924e-ed7359151817\") " pod="default/test-pod-1" Dec 13 14:27:51.231538 kubelet[1611]: E1213 14:27:51.231514 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:51.278000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.284143 kernel: Failed to create system directory netfs Dec 13 14:27:51.284182 kernel: audit: type=1400 audit(1734100071.278:758): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.284204 kernel: Failed to create system directory netfs Dec 13 14:27:51.284217 kernel: audit: type=1400 audit(1734100071.278:758): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.278000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.287387 kernel: Failed to create system directory netfs Dec 13 14:27:51.287415 kernel: audit: type=1400 audit(1734100071.278:758): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.278000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.290619 kernel: Failed to create system directory netfs Dec 13 14:27:51.290644 kernel: audit: type=1400 audit(1734100071.278:758): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.278000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.278000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5639043775e0 a1=153bc a2=5638e14082b0 a3=5 items=0 ppid=9 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.278000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:51.299532 kernel: audit: type=1300 audit(1734100071.278:758): arch=c000003e syscall=175 success=yes exit=0 a0=5639043775e0 a1=153bc a2=5638e14082b0 a3=5 items=0 ppid=9 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.299558 kernel: audit: type=1327 audit(1734100071.278:758): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:51.306028 kernel: Failed to create system directory fscache Dec 13 14:27:51.306062 kernel: Failed to create system directory fscache Dec 13 14:27:51.306077 kernel: Failed to create system directory fscache Dec 13 14:27:51.306089 kernel: audit: type=1400 audit(1734100071.302:759): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.314680 kernel: Failed to create system directory fscache Dec 13 14:27:51.314708 kernel: audit: type=1400 audit(1734100071.302:759): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.314723 kernel: audit: type=1400 audit(1734100071.302:759): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.314736 kernel: Failed to create system directory fscache Dec 13 14:27:51.314748 kernel: audit: type=1400 audit(1734100071.302:759): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.318535 kernel: Failed to create system directory fscache Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.319940 kernel: Failed to create system directory fscache Dec 13 14:27:51.319963 kernel: Failed to create system directory fscache Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.320643 kernel: Failed to create system directory fscache Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.321982 kernel: Failed to create system directory fscache Dec 13 14:27:51.322005 kernel: Failed to create system directory fscache Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.322724 kernel: Failed to create system directory fscache Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.324075 kernel: Failed to create system directory fscache Dec 13 14:27:51.324099 kernel: Failed to create system directory fscache Dec 13 14:27:51.302000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.302000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56390458c9c0 a1=4c0fc a2=5638e14082b0 a3=5 items=0 ppid=9 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.302000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:51.325625 kernel: FS-Cache: Loaded Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.354977 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.355011 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.355677 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.356989 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.357067 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.357780 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.359155 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.359178 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.359823 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.361150 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.361173 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.361838 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.363369 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.363403 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.364305 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.365196 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.365890 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.366632 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.367962 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.367986 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.368648 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.370180 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.370218 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.370904 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.371613 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.372896 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.372919 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.373620 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.374917 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.374956 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.375624 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.376945 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.376968 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.377774 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.379079 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.379102 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.379757 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.381082 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.381105 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.381761 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.383074 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.383097 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.383752 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.385060 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.385083 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.385740 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.387049 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.387072 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.387730 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.389102 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.389125 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.389767 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.391046 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.391070 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.391753 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.393103 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.393128 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.393796 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.395131 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.395151 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.395815 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.397154 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.397178 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.397840 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.399174 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.399194 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.399894 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.400616 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.401913 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.401937 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.402624 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.403931 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422892 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422927 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422941 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422954 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422966 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422976 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422986 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.422998 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423009 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423037 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423048 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423060 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423072 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423083 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423095 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423106 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423117 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423128 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423139 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423151 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423167 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423186 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423199 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423211 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423223 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423234 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423245 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423256 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423269 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423281 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.423292 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.425949 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.425979 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.425992 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.426672 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.428005 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.428030 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.428705 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.430046 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.430066 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.430727 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.432063 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.432095 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.432762 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.434090 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.434114 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.434781 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.435650 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.437185 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.437253 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.437938 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.438637 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.439977 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.439998 kernel: Failed to create system directory sunrpc Dec 13 14:27:51.346000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.447689 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:27:51.447743 kernel: RPC: Registered udp transport module. Dec 13 14:27:51.447759 kernel: RPC: Registered tcp transport module. Dec 13 14:27:51.447772 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:27:51.346000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5639045d8ad0 a1=1a7f1c a2=5638e14082b0 a3=5 items=6 ppid=9 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.346000 audit: CWD cwd="/" Dec 13 14:27:51.346000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:51.346000 audit: PATH item=1 name=(null) inode=35169 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:51.346000 audit: PATH item=2 name=(null) inode=35169 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:51.346000 audit: PATH item=3 name=(null) inode=35170 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:51.346000 audit: PATH item=4 name=(null) inode=35169 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:51.346000 audit: PATH item=5 name=(null) inode=35171 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:51.346000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.530670 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.532175 kernel: Failed to create system directory nfs Dec 13 14:27:51.532205 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.532964 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.533744 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.535412 kernel: Failed to create system directory nfs Dec 13 14:27:51.535609 kernel: Failed to create system directory nfs Dec 13 14:27:51.537188 kernel: Failed to create system directory nfs Dec 13 14:27:51.537220 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.538012 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.538799 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.539635 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.541058 kernel: Failed to create system directory nfs Dec 13 14:27:51.549814 kernel: Failed to create system directory nfs Dec 13 14:27:51.549841 kernel: Failed to create system directory nfs Dec 13 14:27:51.549855 kernel: Failed to create system directory nfs Dec 13 14:27:51.549866 kernel: Failed to create system directory nfs Dec 13 14:27:51.549877 kernel: Failed to create system directory nfs Dec 13 14:27:51.549888 kernel: Failed to create system directory nfs Dec 13 14:27:51.549899 kernel: Failed to create system directory nfs Dec 13 14:27:51.549910 kernel: Failed to create system directory nfs Dec 13 14:27:51.549920 kernel: Failed to create system directory nfs Dec 13 14:27:51.549931 kernel: Failed to create system directory nfs Dec 13 14:27:51.549942 kernel: Failed to create system directory nfs Dec 13 14:27:51.549954 kernel: Failed to create system directory nfs Dec 13 14:27:51.549966 kernel: Failed to create system directory nfs Dec 13 14:27:51.549978 kernel: Failed to create system directory nfs Dec 13 14:27:51.549989 kernel: Failed to create system directory nfs Dec 13 14:27:51.550000 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.550937 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.551615 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.552869 kernel: Failed to create system directory nfs Dec 13 14:27:51.552892 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.554137 kernel: Failed to create system directory nfs Dec 13 14:27:51.554157 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.554792 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.556050 kernel: Failed to create system directory nfs Dec 13 14:27:51.556070 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.556697 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.557937 kernel: Failed to create system directory nfs Dec 13 14:27:51.557962 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.558616 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.559831 kernel: Failed to create system directory nfs Dec 13 14:27:51.559854 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.561090 kernel: Failed to create system directory nfs Dec 13 14:27:51.561115 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.561740 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.562996 kernel: Failed to create system directory nfs Dec 13 14:27:51.563024 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.563648 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.564895 kernel: Failed to create system directory nfs Dec 13 14:27:51.564920 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.566154 kernel: Failed to create system directory nfs Dec 13 14:27:51.566177 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.566798 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.568044 kernel: Failed to create system directory nfs Dec 13 14:27:51.568067 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.568696 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.569944 kernel: Failed to create system directory nfs Dec 13 14:27:51.569963 kernel: Failed to create system directory nfs Dec 13 14:27:51.523000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.583620 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:27:51.523000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5639047f9700 a1=16e97c a2=5638e14082b0 a3=5 items=0 ppid=9 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.523000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.631201 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.631243 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.631257 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.632962 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.632986 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.633004 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.634145 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.634169 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.635915 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.635935 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.635961 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.637082 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.637102 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.638845 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.638871 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.638885 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.640041 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.640067 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.640675 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.641843 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.641868 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.643020 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.643043 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.644928 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.644948 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.644959 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.646101 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.646121 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.648108 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.648127 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.648138 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.649886 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.649907 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.649923 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.651138 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.651159 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.652899 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.652927 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.652941 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.654055 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.654080 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.654633 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.655908 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.655945 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.657142 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.657165 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.658866 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.658890 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.658901 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.660032 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.660073 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.661929 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.661949 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.661959 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.663110 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.663129 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.664894 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.664912 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.664928 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.666148 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.666172 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.667946 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.667972 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.667985 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.669112 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.669135 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.669703 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.670905 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.670930 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.672095 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.672115 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.673985 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.674006 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.674017 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.674641 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.675812 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.675832 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.676969 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.676989 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.678132 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.678157 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.678713 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.679878 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.679908 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.681080 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.681107 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.681679 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.682844 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.682863 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.684006 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.684025 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.685177 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.685201 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.621000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.686683 kernel: Failed to create system directory nfs4 Dec 13 14:27:51.780693 kernel: NFS: Registering the id_resolver key type Dec 13 14:27:51.782036 kernel: Key type id_resolver registered Dec 13 14:27:51.782053 kernel: Key type id_legacy registered Dec 13 14:27:51.621000 audit[3093]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa00d3c4010 a1=208de4 a2=55934fba12b0 a3=5 items=0 ppid=9 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.621000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.824686 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.824728 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.824744 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.824757 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.825933 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.826692 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.826722 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.827969 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.827990 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.829178 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.829202 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.831006 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.831026 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.831042 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.832210 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.832230 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.834022 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.834048 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.834062 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.835880 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.835905 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.837150 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.837176 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.837190 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.817000 audit[3094]: AVC avc: denied { confidentiality } for pid=3094 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:51.838958 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.839031 kernel: Failed to create system directory rpcgss Dec 13 14:27:51.817000 audit[3094]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f90cc76e010 a1=70af4 a2=563b539562b0 a3=5 items=0 ppid=9 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.817000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:27:51.930805 nfsidmap[3103]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:27:51.933238 nfsidmap[3104]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:27:51.944000 audit[1359]: AVC avc: denied { watch_reads } for pid=1359 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2478 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:51.944000 audit[1359]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c12fdeefb0 a2=10 a3=93fe6469dc15caf6 items=0 ppid=1 pid=1359 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.944000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:27:51.944000 audit[1359]: AVC avc: denied { watch_reads } for pid=1359 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2478 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:51.944000 audit[1359]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c12fdeefb0 a2=10 a3=93fe6469dc15caf6 items=0 ppid=1 pid=1359 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.944000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:27:51.944000 audit[1359]: AVC avc: denied { watch_reads } for pid=1359 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2478 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:51.944000 audit[1359]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c12fdeefb0 a2=10 a3=93fe6469dc15caf6 items=0 ppid=1 pid=1359 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.944000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:27:51.945000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2478 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:51.945000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2478 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:51.945000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2478 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:52.232247 kubelet[1611]: E1213 14:27:52.232215 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:52.234306 env[1245]: time="2024-12-13T14:27:52.233807010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0ceb1a69-573f-4c66-924e-ed7359151817,Namespace:default,Attempt:0,}" Dec 13 14:27:52.305779 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:27:52.305877 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:27:52.303709 systemd-networkd[1060]: cali5ec59c6bf6e: Link UP Dec 13 14:27:52.305914 systemd-networkd[1060]: cali5ec59c6bf6e: Gained carrier Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.266 [INFO][3105] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.131-k8s-test--pod--1-eth0 default 0ceb1a69-573f-4c66-924e-ed7359151817 1211 0 2024-12-13 14:27:39 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.131 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.267 [INFO][3105] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-eth0" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.282 [INFO][3116] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" HandleID="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Workload="10.67.124.131-k8s-test--pod--1-eth0" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.288 [INFO][3116] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" HandleID="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Workload="10.67.124.131-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.131", "pod":"test-pod-1", "timestamp":"2024-12-13 14:27:52.282086258 +0000 UTC"}, Hostname:"10.67.124.131", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.288 [INFO][3116] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.288 [INFO][3116] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.288 [INFO][3116] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.131' Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.289 [INFO][3116] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.292 [INFO][3116] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.294 [INFO][3116] ipam/ipam.go 489: Trying affinity for 192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.295 [INFO][3116] ipam/ipam.go 155: Attempting to load block cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.296 [INFO][3116] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.18.192/26 host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.296 [INFO][3116] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.18.192/26 handle="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.296 [INFO][3116] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1 Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.298 [INFO][3116] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.18.192/26 handle="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.300 [INFO][3116] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.18.196/26] block=192.168.18.192/26 handle="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.300 [INFO][3116] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.18.196/26] handle="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" host="10.67.124.131" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.300 [INFO][3116] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.300 [INFO][3116] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.18.196/26] IPv6=[] ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" HandleID="k8s-pod-network.5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Workload="10.67.124.131-k8s-test--pod--1-eth0" Dec 13 14:27:52.314913 env[1245]: 2024-12-13 14:27:52.301 [INFO][3105] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0ceb1a69-573f-4c66-924e-ed7359151817", ResourceVersion:"1211", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.18.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:52.315447 env[1245]: 2024-12-13 14:27:52.301 [INFO][3105] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.18.196/32] ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-eth0" Dec 13 14:27:52.315447 env[1245]: 2024-12-13 14:27:52.301 [INFO][3105] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-eth0" Dec 13 14:27:52.315447 env[1245]: 2024-12-13 14:27:52.306 [INFO][3105] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-eth0" Dec 13 14:27:52.315447 env[1245]: 2024-12-13 14:27:52.308 [INFO][3105] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.131-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0ceb1a69-573f-4c66-924e-ed7359151817", ResourceVersion:"1211", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.131", ContainerID:"5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.18.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c2:f4:67:9b:f8:5c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:52.315447 env[1245]: 2024-12-13 14:27:52.313 [INFO][3105] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.131-k8s-test--pod--1-eth0" Dec 13 14:27:52.326629 env[1245]: time="2024-12-13T14:27:52.326283722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:52.326629 env[1245]: time="2024-12-13T14:27:52.326328739Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:52.326629 env[1245]: time="2024-12-13T14:27:52.326343697Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:52.326629 env[1245]: time="2024-12-13T14:27:52.326421190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1 pid=3146 runtime=io.containerd.runc.v2 Dec 13 14:27:52.339000 audit[3141]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:52.339000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffce3dee610 a2=0 a3=7ffce3dee5fc items=0 ppid=2322 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.339000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:52.348428 systemd[1]: run-containerd-runc-k8s.io-5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1-runc.p3HkBJ.mount: Deactivated successfully. Dec 13 14:27:52.351493 systemd[1]: Started cri-containerd-5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1.scope. Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.363000 audit: BPF prog-id=123 op=LOAD Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3146 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633731393864643732663930633835306165633535373465366435 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3146 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633731393864643732663930633835306165633535373465366435 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit: BPF prog-id=124 op=LOAD Dec 13 14:27:52.364000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a8410 items=0 ppid=3146 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633731393864643732663930633835306165633535373465366435 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit: BPF prog-id=125 op=LOAD Dec 13 14:27:52.364000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a8458 items=0 ppid=3146 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633731393864643732663930633835306165633535373465366435 Dec 13 14:27:52.364000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:27:52.364000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.364000 audit: BPF prog-id=126 op=LOAD Dec 13 14:27:52.364000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a8868 items=0 ppid=3146 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633731393864643732663930633835306165633535373465366435 Dec 13 14:27:52.366514 systemd-resolved[1202]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:27:52.383658 env[1245]: time="2024-12-13T14:27:52.383634096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0ceb1a69-573f-4c66-924e-ed7359151817,Namespace:default,Attempt:0,} returns sandbox id \"5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1\"" Dec 13 14:27:52.384768 env[1245]: time="2024-12-13T14:27:52.384755883Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:27:52.775625 env[1245]: time="2024-12-13T14:27:52.775583622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.776499 env[1245]: time="2024-12-13T14:27:52.776482869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.777875 env[1245]: time="2024-12-13T14:27:52.777858143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.779148 env[1245]: time="2024-12-13T14:27:52.779131353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:52.779710 env[1245]: time="2024-12-13T14:27:52.779690197Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:27:52.781619 env[1245]: time="2024-12-13T14:27:52.781583267Z" level=info msg="CreateContainer within sandbox \"5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:27:52.800095 env[1245]: time="2024-12-13T14:27:52.800071169Z" level=info msg="CreateContainer within sandbox \"5ec7198dd72f90c850aec5574e6d5308578d1756ba1412e6d5828250c95814a1\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b48f79a65c44c8b362a2a865e02ecb2ddc186e71b0f1eed30b1bce97be72c593\"" Dec 13 14:27:52.800796 env[1245]: time="2024-12-13T14:27:52.800771012Z" level=info msg="StartContainer for \"b48f79a65c44c8b362a2a865e02ecb2ddc186e71b0f1eed30b1bce97be72c593\"" Dec 13 14:27:52.813027 systemd[1]: Started cri-containerd-b48f79a65c44c8b362a2a865e02ecb2ddc186e71b0f1eed30b1bce97be72c593.scope. Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.827000 audit: BPF prog-id=127 op=LOAD Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3146 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234386637396136356334346338623336326132613836356530326563 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3146 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234386637396136356334346338623336326132613836356530326563 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.828000 audit: BPF prog-id=128 op=LOAD Dec 13 14:27:52.828000 audit[3190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000273dc0 items=0 ppid=3146 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234386637396136356334346338623336326132613836356530326563 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit: BPF prog-id=129 op=LOAD Dec 13 14:27:52.829000 audit[3190]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000273e08 items=0 ppid=3146 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234386637396136356334346338623336326132613836356530326563 Dec 13 14:27:52.829000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:27:52.829000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:52.829000 audit: BPF prog-id=130 op=LOAD Dec 13 14:27:52.829000 audit[3190]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2218 items=0 ppid=3146 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:52.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234386637396136356334346338623336326132613836356530326563 Dec 13 14:27:52.841672 env[1245]: time="2024-12-13T14:27:52.841646564Z" level=info msg="StartContainer for \"b48f79a65c44c8b362a2a865e02ecb2ddc186e71b0f1eed30b1bce97be72c593\" returns successfully" Dec 13 14:27:53.232723 kubelet[1611]: E1213 14:27:53.232687 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:53.331863 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount421514705.mount: Deactivated successfully. Dec 13 14:27:53.842740 systemd-networkd[1060]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:27:54.233085 kubelet[1611]: E1213 14:27:54.233058 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:55.233642 kubelet[1611]: E1213 14:27:55.233614 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:56.234214 kubelet[1611]: E1213 14:27:56.234178 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:57.234643 kubelet[1611]: E1213 14:27:57.234593 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:58.235015 kubelet[1611]: E1213 14:27:58.234985 1611 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"